Design and Implementation of Encrypted Negative Password
Survey Paper | Journal Paper
Vol.07 , Issue.15 , pp.111-115, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.111115
Abstract
Secure password storage is the essential feature in system based on password verification, which is most broadly used verification technique, despite its some security weakness. In this paper, a password authentication scheme that is designed for secure password storage and could be easily consolidated into present authentication systems. In this framework the client enters the plain password which is hashed through the cryptographic hash function such as SHA-256. This hash function isthen converted into negative password. Finally using a symmetric-key algorithm such as Advanced Encryption Standard the negative password is encrypted into an ENP(Encrypted Negative Password).So this method makes it difficult for the intruder to crack the password. ENP method overcomes pre computation attacks.ENP does not provide extra elements such as salt which is one of useful advantage.ENP is the first password protection scheme which integrates cryptographic hash function, the negative password and the symmetric-key algorithm in a successful way.
Key-Words / Index Term
Authentication, negative database, symmetric key algorithm
References
[1] J. Bonneau, C. Herley, P. C. van Oorschot, and F. Stajano, “Passwords and the evolution of imperfect authentication,” Communications of the ACM, vol. 58, no. 7, pp. 78–87, Jun. 2015.
[2] M. A. S. Gokhale and V. S. Waghmare, “The shoulder surfing resistant graphical password authentication technique,” Procedia Computer Science, vol. 79, pp. 490–498, 2016.
[3] J. Ma, W. Yang, M. Luo, and N. Li, “A study of probabilistic password models,” in Proceedings of 2014 IEEE Symposium on Security and Privacy, May 2014, pp. 689–704.
[4] A. Adams and M. A. Sasse, “Users are not the enemy,” Communications of the ACM, vol. 42, no. 12, pp. 40–46, Dec. 1999.
[5] E. H. Spafford, “Opus: Preventing weak password choices,” Computers & Security, vol. 11, no. 3, pp. 273–278, 1992.
[6] Y. Li, H. Wang, and K. Sun, “Personal information in passwords and its security implications,” IEEE Transactions on Information Forensics and Security, vol. 12, no. 10, pp. 2320–2333, Oct. 2017.
[7] D. Florencio and C. Herley, “A large-scale study of web password habits,” in Proceedings of the 16th International Conference on World Wide Web. ACM, 2007, pp. 657–666.
[8] R. Shay, S. Komanduri, A. L. Durity, P. S. Huh, M. L. Mazurek, S. M. Segreti, B. Ur, L. Bauer, N. Christin, and L. F. Cranor, “Designing password policies for strength and usability,” ACM Transactions on Information and System Security, vol. 18, no. 4, pp. 13:1–13:34, May 2016.
[9] D. Wang, D. He, H. Cheng, and P. Wang, “fuzzyPSM: A new password strength meter using fuzzy probabilistic context-free grammars,” in Proceedings of 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun. 2016, pp. 595–606.
[10] H. M. Sun, Y. H. Chen, and Y. H. Lin, “oPass: A user authentication protocol resistant to password stealing and password reuse attacks,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp. 651–663, Apr. 2012.
[11] M. Zviran and W. J. Haga, “Password security: An empirical study,” Journal of Management Information Systems, vol. 15, no. 4, pp. 161– 185, 1999.
[12] P. Andriotis, T. Tryfonas, and G. Oikonomou, “Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method,” in Proceedings of Human Aspects of Information Security, Privacy, and Trust. Springer International Publishing, 2014, pp. 115– 126.
[13] D. P. Jablon, “Strong password-only authenticated key exchange,” SIGCOMM Computer Communication Review, vol. 26, no. 5, pp. 5–26, Oct. 1996.
[14] J. Jose, T. T. Tomy, V. Karunakaran, A. K. V, A. Varkey, and N. C. A., “Securing passwords from dictionary attack with character-tree,” in Proceedings of 2016 International Conference on Wireless Communications, Signal Processing and Networking, Mar. 2016, pp. 2301–2307.
[15] A. Arora, A. Nandkumar, and R. Telang, “Does information security attack frequency increase with vulnerability disclosure? an empirical analysis,” Information Systems Frontiers, vol. 8, no. 5, pp. 350–362, Dec. 2006.
[16] R. Song, “Advanced smart card based password authentication protocol,” Computer Standards & Interfaces, vol. 32, no. 5, pp. 321–325, 2010.
[17] M. C. Ah Kioon, Z. S. Wang, and S. Deb Das, “Security analysis of MD5 algorithm in password storage,” in Proceedings of Instruments, Measurement, Electronics and Information Engineering. Trans Tech Publications, Oct. 2013, pp. 2706–2711.
[18] P. Oechslin, “Making a faster cryptanalytic time-memory trade-off,” in Proceedings of Advances in Cryptology - CRYPTO 2003. Springer Berlin Heidelberg, 2003, pp. 617–630.
[19] S. Noel, M. Elder, S. Jajodia, P. Kalapa, S. O’Hare, and K. Prole, “Advances in topological vulnerability analysis,” in Proceedings of 2009 Cybersecurity Applications Technology Conference for Homeland Security, Mar. 2009, pp. 124–129.
Citation
Manasa N, Preethi P, Rakshitha R, Jyothi V, Lakshmikantha S, "Design and Implementation of Encrypted Negative Password", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.111-115, 2019.
Detection of Anomaly Actions on Social Networks using Machine Learning
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.116-121, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.116121
Abstract
Social media is no doubt the richest source of human generated data. The user’s options, feedbacks and critiques provided by social network users reflect attitudes and sentiments of certain topics, products, or services. Every day, large quantity of messages is created, stored, commented, and shared by people on social media websites, such as Twitter, Instagram, Quora and Facebook. This in general acts as valuable data for researchers and practitioners in different application domains, such as data analytics, marketing, to inform decision-making. Extracting valuable social signals from the huge crowd’s messages is challenging, due to the dynamic crowd behaviors. These are the anomalies caused by a user because of his/her variable behavior towards different sources. Due to such risk parameters, it is always a great practice to have a mechanism to monitor each online social network user. This paper provides a way in which anomaly analysis can be implemented in social media such as Facebook. This work hence acts as a risk analyzer for the administrator of the Face book services so that they can formulate strategies to overcome the same.
Key-Words / Index Term
Anomaly detection,Social network,SVM,Data Analytics
References
[1] M Swarna sudha ,K Arun Priya,”Data mining approach for anomaly detection in social network analysis”,2018,ICICCT conference 2018
[2] Z. Wang and Y. Parth, “Extreme Learning Machine for Multi-class Sentiment Classification of Tweets,” Proc. ELM-2015, Springer Int. Publ. 2016, vol. 1, pp. 1–11, 2016.
[3] M. Egele, G. Stringhini, C. Kruegel, and G. Vigna, “Towards detecting compromised accounts on social networks,” IEEE Transactions on Dependable andSecureComputing,vol.14,no.4,pp.447 – 460,2015.
[4] R. Yu, X. He, and Y. Liu, “Glad: group anomaly detection in social media analysis,” ACM Transactions on Knowledge Discovery from Data, vol. 10, no. 2, pp. 18–22, 2015.
[5] Z. Wang, J. C. Tong, and D. Chan, “Issues of social data analytics with a new method for sentiment analysis of social media data,” in 2014 IEEE 6th International Conference on Cloud Computing Technology and Science, 2014, pp. 899–904.
[6]M.Egele,G. Stringhini, “Compa: Detecting compromised accounts on social networks,” in NDSS, 2013,
[7] E. Haddi, X. Liu, and Y. Shi, “The role of text pre-processing in sentiment analysis,” Procedia Computer Science, vol. 17, pp. 26-32, Jan.2013.
[8] P. Gonçalves and M. Araújo, “Comparing and combining sentiment analysis methods,” Proc. first ACM Conf. Online Soc. networks. ACM, pp. 27–38, 2013.
[9] B. Yuan, Y. Liu, and H. Li, “Sentiment classification in Chinese microblogs:Lexicon-based and learning-based approaches,” Int. Proc. Econ. Dev. Res., vol. 68, pp. 1–6, 2013
[10] J. Ortigosa-Hernández, J. D. Rodríguez, L. Alzate, M. Lucania, I. Inza, “Approaching sentiment analysis by using semisupervised learning of multi-dimensional classifiers,” Neurocomputing, vol. 92, pp. 98-115, Sep. 2012.
[11] H. Ji, H. Deng, and J. Han, “Uncertainty reduction for knowledge discovery and information extraction on the World Wide Web,” Proceedings of the IEEE, vol. 100, no. 9, pp. 2658-2674, Sep. 2012.
[12] T. Takahashi, R. Tomioka, and K. Yamanishi, “Discovering emerging topics in social streams via link anomaly detection,”2011 IEEE 11th International Conference on Data Mining, pp. 1230–1235, 2011.
[13] X. Glorot, A. Bordes, and Y. Bengio, “Domain adaptation for largescalesentiment classification: A deep learning approach,” Proceedings of the 28th International Conference on Machine Learning
[14] B. Gokaraju, S. S. Durbha, R. L. King, S. Member, and N. H. Younan,“A machine learning based spatio-temporal data mining approach for
detection of harmful algal blooms in the Gulf of Mexico,” IEEE Journal, vol.4, pp. 710-720, 2011.
[15] N. A. Heard, D. J. Weston, K. Platanioti, D. J. Hand, et al.,“Bayesian anomaly detection methods for social networks,” ANNS, vol. 4, pp. 645–662, 2010.
[16] L. Akoglu, M. McGlohon, and C. Faloutsos, “Oddball: Spottinganomalies in weighted graphs,” in Pacific-Asia Conference on KnowledgeDiscovery and Data Mining, pp. 410–421, 2010.
[17] R. Sommer and V. Paxson, “Outside the closed world: On using machine learning for network intrusion detection,” in 2010 IEEE Symposium on Security and Privacy, pp. 305–316, May 2010.
[18] T. Wilson, J. Wiebe, “Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis,” ACL, vol. 35, no. 3, 2009.
[19] G.-B. Huang, Q.-Y. Zhu, and C.-K. Siew, “Extreme learning machine: Theory and applications,” Neurocomputing, vol. 70, no. 1–3, pp. 489– 501,Dec. 2006.
[20] B. Pang, L. Lee, and S. Vaithyanathan, “Thumbs up? sentiment classificationusing machine learning techniques,” Proc. ACL-02 Conf. Empir. methods Nat. Lang. Process. Assoc. Comput. Linguist., vol. 10, pp. 79–86, 2002.
Citation
Mayur Jain, Prashanth A, Prabhudev B K, Sagar Reddy N J, Mangala C N, "Detection of Anomaly Actions on Social Networks using Machine Learning", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.116-121, 2019.
Real- Time Analysis And Simulation ofEfficient Public Transport Monitoring System
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.122-127, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.122127
Abstract
This project proposed a method for safety measures which are necessary while driving vehicles. Road safety rules can be useful up to some extent to get away from accidents. If any misbehaviour occurs in vehicle due to driver, then a message will go to nearest police station along with the problem specification. That particular message includes the location of the bus where it is occurred. Our system can also detect alcoholic person who has been entering into bus. The alcoholic person may be driver or may be passenger. In our Project MEMS sensor is used to identify whether an accident takes place or not. If an accident takes place, a message will go to nearestpolice station.This project focuses on the implementation of a Real-Time bus Tracking System (RTBTS), by installing GPS (Global Positioning System)-module devices on buses which will transmit the current location on the GPS Receiver.We are using RFID based authentication for both passengersand driver. Fire sensor is used to monitor the fire in the bus if fire occurs in the bus send intimation to the owner and fire station. If this misconception occurs, then that message will go to nearest police station. In this way, we are indirectly providing safety to passengers and bus.
Key-Words / Index Term
RFID based authentication,real-time information, Real-Time Bus Tracking System (RTBTS), GPS module
References
[1] R.Ramani, S. Valarmathy, Dr. N Suthanthira, S. Selavaraju, M.Thiruppathi, R.Thagam, ―Vehicle Tracking and Locking Based GSM and GPS‖, Issue Date: Sept 2017
[2] F. M Franczyk, and J.D. Vanstone, ―Vehicle Warning System‖, Patent number: 73639, Issue Date: 22 Apr 2018.
[3] William Stalling, ―Wireless Communication and Networks‖, 2nd edition, prentice hall of India, 2017
[4] Krishna Kant, ―Microprocessor and Microcontroller‖, Eastern Company Edition, New Delhi 2018
[5] PranjaliJumle and Suresh Gohane “Intelligent Bus Tracking System based on GSM and GPS”IJCSN International Journal of Computer Science and Network, Volume 6, Issue 2, April 2017.
[6] Dhruv Patel, Rahul Seth and VikasMishra “Real- Time Bus Tracking System” International Research Journal of Engineering and Technology (IRJET) 2017.
[7] ManashPratimGohain, Speed Governors, GPS must forschool buses,The Times of India,February 24,2017
[8]Kumar, B. A., Vanajakshi, L., & Subramanian, S. C., "Bus traveltime prediction using a time-space discretization approach,"Transp.Res. Part C Emerg.Technol., pp. vol. 79, 308–332, 2017.
Citation
Masthan M, MdMosahid Raeen, Mirza Nasim Akhtar Begg, Veeresh Patil, "Real- Time Analysis And Simulation ofEfficient Public Transport Monitoring System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.122-127, 2019.
Intelligent Product Retrieval System
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.128-132, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.128132
Abstract
It is desired (especially for young people) to shop for the same or similar products shown in the multimedia contents (such as online TV programs). This indicates an urgent demand for improving the experience of TV-to-Online (T2O). In this paper, a transfer learning approach as well as a prototype system for effortless T2O experience is developed. In this paper, a novel manifold regularized heterogeneous multitask metric learning framework is proposed, in which each domain is treated equally. The proposed approach allows us to simultaneously exploit the information from other domains and the unlabelled. In the system, a key component is high-precision product search, which is to fulfil exact matching between a query item and the database ones. The matching performance primarily relies on distance estimation, but the data characteristics cannot be well modelled and exploited by a simple Euclidean distance.
Key-Words / Index Term
TV-to-Online, distance metric learning, transfer learning, heterogeneous domains, manifold regularization, ranking-based loss.
References
[1] I. Gonzalez-Diaz, M. Birinci, F. Diaz-de Maria, and E. J. Delp, “Neighborhood matching for image retrieval,” IEEE Trans. Multimedia, vol. 19, no. 3, pp. 544–558, Mar. 2017.
[2] S. Karaoglu, R. Tao, T. Gevers, and A. W. Smeulders, “Words matter: Scene text for image classification and retrieval,” IEEE Trans.Multimedia, vol. 19, no. 5, pp. 1063–1076, May 2017.
[3] J.-E. Lee, R. Jin, and A. K. Jain, “Rank-based distance metric learning: An application to image retrieval,” in Proc. IEEE Conf. Comput. Vision Pattern Recognit., 2008, pp. 1–8. 2124 IEEE TRANSACTIONS ON MULTIMEDIA, VOL. 20, NO. 8, AUGUST 2018
[4] E. P. Xing, M. I. Jordan, S. Russell, and A. Ng, “Distance metric learning with application to clustering with side-information,” in Proc. Int. Conf. Neural Inf. Process. Syst., 2002, pp. 505–512.
[5] Y. Luo, Y. Wen, and D. Tao, “Heterogeneous multitask metric learning across multiple domains,” IEEE Trans. Neural Netw. Learn. Syst., Oct. 4, 2017, doi: 10.1109/TNNLS.2017.2750321.
[6] Y. Zhang and D.-Y. Yeung, “Multi-task learning in heterogeneous feature spaces,” in Proc. AAAI Conf. Artif. Intell., 2011, pp. 574–579.
[7] P. Xie and E. P. Xing, “Multi-modal distance metric learning,” in Proc.Int. Joint Conf. Artif. Intell., 2013, pp. 1806–1812.
[8] K. Aas and L. Eikvil, “Text categorization:Asurvey,”Norwegian Comput. Center, Oslo, Norway, Tech. Rep., 1999.
[9] R. Suzuki, D. Sakamoto, and T. Igarashi, “AnnoTone: Record-time audio watermarking for context-aware video editing,” in Proc. ACM Conf. Human Factors Comput. Syst., 2015, pp. 57–66.
[10] Y. Luo et al., “Multiview vector-valued manifold regularization for multilabel image classification,” IEEE Trans. Neural Netw. Learn. Syst., vol. 24, no. 5, pp. 709–722, May 2013.
Citation
Manisha Sharma, Pavani S, Pooja R, Varshitha U, Sunanda V K, "Intelligent Product Retrieval System", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.128-132, 2019.
Dispersion of Cheating Behaviours in Online Social Networks
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.133-137, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.133137
Abstract
Social contact are know to be spread through human behaviours. The diffusion process on social networks has also been grip to spread the undesirable dispersion.The main attention is to attract the contagion of malicious or even criminal behaviors in online social networks. Here, we study the social contagion problem of cheating behavior found in the massively multiplayer online role playing game (MMORPG) that provides a lifelike environment with rich and realistic user interactions. It has a strong chance of being noticed by their friends and leading them to cheat themselves due to their abnormal behaviour. In this paper, we show the existence of the dispersion of cheating. We then explore various possible social reinforcement mechanisms after introducing several factors to quantify the effect of social reinforcement on the dispersion and analyze the dynamics of bot diffusion in an extensive user interaction log from a major MMORPG.
Key-Words / Index Term
Dispersion, SVM, Social influence model
References
[1] M. Bampo, M. T. Ewing, D. R. Mather, D. Stewart, and M. Wallace,``The effects of the social structure of digital networks on viral marketing performance,`` Inf. Syst. Res., vol. 19, no. 3, pp. 273_290, 2008.
[2] J. Goldenberg, B. Libai, and E. Müller, ``Talk of the network: A complex systems look at the underlying process of word-of-mouth,`` Marketing Lett., vol. 12, no. 3, pp. 211_223, 2001.
[3] T. Heverin and L. Zach, ``Use of microblogging for collective sensemaking during violent crises: A study of three campus shootings,`` J. Amer. Soc. Inf. Sci. Technol., vol. 63, no. 1, pp. 34_47, 2012.
[4] J. Kleinberg, ``The convergence of social and technological networks,`` Commun. ACM, vol. 51, no. 11, pp. 66_72, 2008
[5] M. Szell and S. Thurner, ``Measuring social dynamics in a massive multiplayer online game,`` Social Netw., vol. 32, no. 4, pp. 313_329, 2010.
[6] C. R. Shalizi and A. C. Thomas, ``Homophily and contagion are generically confounded in observational social network studies,`` Sociol. Methods Res., vol. 40, no. 2, pp. 211_239, 2011.
[7] S. Aral, L. Muchnik, and A. Sundararajan, ``Distinguishing influence based contagion from homophily-driven diffusion in dynamic networks,``
Proc. Nat. Acad. Sci. USA, vol. 106, no. 51, pp. 21544_21549, 2009.
[8] L. Coviello et al., ``Detecting emotional contagion in massive social networks,`` PLoS ONE, vol. 9, no. 3, p. e90315, 2014.
[9] S. Son, A. R. Kang, H.-C. Kim, T. Kwon, J. Park, and H. K. Kim, ``Analysis of context dependence in social interaction networks of a massively multiplayer online role-playing game,`` PLoS ONE, vol. 7, no. 4, p. e33918, 2012.
[10] A. Mislove, H. S. Koppula, K. P. Gummadi, P. Druschel, and
B. Bhattacharjee, ``Growth of the _ickr social network,`` in Proc. 1st
Workshop Online Social Netw., 2008, pp. 25_30.
Citation
Shagufta Samreen, Shilpa. K.S, Sneha. K.B, Sneha Pal, Sagar. B, "Dispersion of Cheating Behaviours in Online Social Networks", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.133-137, 2019.
Customisable Bundling Approach for Online Supermarkets using Association Rules of Product Categories
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.138-143, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.138143
Abstract
This research deals with the identification of customers and their buying behavior patterns. The aim is to sell the products which are least preferred by the customers so as to make a cost-effective sale by using bundling approach. A Customized bundling is a group of resources joined together in a single package that has an associated logical name. A bundle is a collection of products which are sold together for a single price. It is the well organized way to make the customer’s shopping self-satisfied. It is implemented by the integration of associative clustering and Support vector machine (SVM) with java.
Key-Words / Index Term
Bundling, Associative clustering, Support vector machine, Suggestions
References
[1]Customer behavior analysis towards online hopping using data mining.,Muqaddas Gull and Arshi Pervaiz,©2018 IEEE.
[2] Customized Bundle Recommendation by Association Rules of Product Categories for Online Supermarkets.,Yan Fang,Xinyue Xiao,Xiaoyu Wang,Huiqing Lan,©2018.
[3] Yang, T. C., & Lai, H. (2006). Comparison of product bundling strategies on different online shopping behaviors. Electronic Commerce Research and Applications, 5(4), 295–304.
[4] Miguéis, V. L., Camanho, A. S., &Falcão e Cunha, J. (2012). Customer data mining for lifestyle segmentation. Expert Systems with Applications, 39(10), 9359–9366.
[5] Liao, S. H., Chen, Y. J., & Hsieh, H. H. (2011). Mining customer knowledge for direct selling and marketing.Expert Systems with Applications, 38(5), 6059–6069.
[6]Fuloria , S . ( 2011 ) How Advanced Analytics Will Inform and Transform U.S. Retail. CognizantReports, July , http://www.cognizant.com/InsightsWhitepapers/How-Advanced-Analytics-Will-Inform-and-Transform-US-Retail.pdf , accessed January 2012 .
[7] Bain Consulting. China Shoppers Report 2017. Beijing: Bein Consulting, 2017.
[8] Jasin S, Sinha A. An LP-based correlatedrounding scheme for multi-item ecommerce orderfulfillment[J]. Operations Research, 2015, 63(6): 1336-1351.
[9] Karimi-Majd, A.-M., &Fathian, M. (2017). Extracting new ideas from the behavior of social network users. Decision Science Letters, 6(3), 207–220.
[10] Miguéis, V. L., Camanho, A. S., &Falcãoe Cunha, J. (2012). Customer data mining for lifestyle segmentation. Expert Systems with Applications, 39(10), 9359–9366.
[11] Liao, S. H., Chen, Y. J., & Lin, Y. T. (2011). Mining customer knowledge to implement online shopping and home delivery for hypermarkets. Expert Systems with Applications, 38(4), 3982– 3991.
[12] Abouee-Mehrizi H, Berman O, Sharma S (2014) Optimal joint replenishment and proactive transshipment policies in a multiperiod inventory system. Working paper, University of Waterloo, Waterloo, Ontario.
[13] Adelman D (2003) Price-directed replenishment of subsets: Methodology and its application to inventory routing. Manufacturing Service Oper. Management 5(4):348–371.
[14] Adelman D, Nemhauser GL, Padron M, Stubbs R, Pandit R (1999) Allocatingfibers in cable manufacturing. Manufacturing Service Oper.
[15] Management 1(1):21–35. Agatz N, Fleischmann M, van Nunen J (2008) E-fulfillment and multi-channel distribution—A review. Eur. J. Oper. Res. 187(2): 339–356. [16] Alptekino ˘glu A, Tang C (2005) A model for analyzing multichannel distribution systems. Eur. J. Oper. Res. 163(3):802–824.
[17] Amazon.com, Inc. (2012) Form 10-K for 2011. Filing date: February 1, 2012. U.S. Securities and Exchange Commission,Washington,DC.
[18] Cattani K, Gilland W, Heese H, Swaminathan J (2006) Boiling frogs: Pricing strategies for a manufacturer adding a direct channel that competes with the traditional channel. Production Oper. Management 15(1):40–56.
[19] Forrester Research, Inc. (2014b) European online retail forecast: 2013 to 2018. Report, May 29. Forrester Research, Inc., Cambridge, MA.
[20] Gans N, van Ryzin G (1999) Dynamic vehicle dispatching: Optimal heavy traffic performance and practical insights. Oper. Res. 47(5):675–692.
[21] Kaplan A (1969) Stock rationing. Management Sci. 15(5):260–267.
[22] Lee H (1987) A multi-echelon inventory model for repairable items with emergency lateral transshipments. Management Sci. 33(10):1302–1316.
Citation
Vani V Nair, Vedashree V, Vimala B K, Yamuna M, ChetanaSrinivas, "Customisable Bundling Approach for Online Supermarkets using Association Rules of Product Categories", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.138-143, 2019.
Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application
Review Paper | Journal Paper
Vol.07 , Issue.15 , pp.144-147, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.144147
Abstract
A good Website is more than just something to look at, it is functional interactive and flawless. As technologies are becoming smart so we need to be smarter enough to utilize them. With the rapid evolution of web technologies, the complexity of web applications has also grown up. Specially making a web application that works well with cross browser is a great challenge. Clearly, cross-browser means something works with all versions of all browsers to have existed since the web began. By this paper we have pointed out some reasons why applications behave or appear differently in different browsers because if you know the cause, you can get a solution.
Key-Words / Index Term
Cloud computing ,Cross browser compatibility, Data security
References
[1] S. Willium, “Network Security and Communication”, IEEE Transaction, Vol.31, Issue.4, pp.123-141, 2012. For Journal
[2] R. Solanki, “Principle of Data Mining”, McGraw-Hill Publication, India, pp. 386-398, 1998. For Book
[3] M. Mohammad, “Performance Impact of Addressing Modes on Encryption Algorithms”, In the Proceedings of the 2001 IEEE International Conference on Computer Design (ICCD 2001), Indore, USA, pp.542-545, 2001. For Conference
[4] S.K. Sharma, “Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc –Networks”, International Journal of Scientific Research in Network Security and Communication, Vol.1, No.5, pp.1-4, 2013.
[5] S.L. Mewada, “Exploration of Efficient Symmetric AES Algorithm”, International Journa of Computer Sciences and Engineering, Vol.4, Issue.11, pp.111-117, 2015.
[6] A. Mardin, T. Anwar, B. Anwer, “Image Compression: Combination of Discrete Transformation and Matrix Reduction”, International Journal of Computer Sciences and Engineering, Vol.5, Issue.1, pp.1-6, 2017.
[7] H.R. Singh, “Randomly Generated Algorithms and Dynamic Connections”, International Journal of Scientific Research in Network Security and Communication, Vol.2, Issue.1, pp.231-238, 2014.
[8] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[9] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[10] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[11] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
Citation
Roshne M K, Shaikh Afreen Md Sardar, Tulsi K, Varshini Dayanidhi C, Vinod H, "Cloud Based Automated Identification and Development to Provide Compatibility and Security for Cross Browser in Web Application", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.144-147, 2019.
Progressive Digitalization of Public Agencies
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.148-152, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.148152
Abstract
Big data could be a potential instrument to vary standard association into perceptive association. There are a long discourse and visit on the usage of big data for the distinction in customary open relationship to present day and fast open relationship within the academician, experts, and policymakers. This examination hopes to analyze the sensibility and significance of large data for sharp association of open work environments. Creating layout demonstrates that numerous models have been created to clear up sharp association however correct analysis on the reputability and significance of monumental information for perceptive association of open affiliations is `in the not too distant past lacking. This article fights that the usage of big data for marvelous association within the comprehensive network division will expand the capability of the general open affiliations fastest open association transport, pushing ahead straightforwardness, decreasing open issue and serving to the change into a pointy affiliation. This paper to boot battles that execution of large data for good association contains a essential add lucky, goof free, real and cost effective advantage development to subjects that prompts the practical money connected distinction during a nation. We applied ECC algorithm for security purpose to prevent the data.
Key-Words / Index Term
Component, Formatting, Style, Styling, Insert (key words)
References
[1] United Nations/American Society for Public Administration[UN/ASPA]. Benchmarking E-government: A Global Perspective:Assessing the Progress of the UN Member States. UN/ASPA: New
York. 2002, p.2.
[2] West DM. 2003. Global E-Government, 2003.http://www.insidepolitics .org/ egovt03int .html accessed 5 August 2004].
[3] World Markets Research Centre. Global E-Government Survey. WorldMarkets Research Centre: London., 2001, p.10.
[4] United Nations. World Public Sector Report: E-Government at theCrossroads. UN: New York, 2003, p.186.
[5] Holliday I. Building e-government in east and southeast Asia: regionalrhetoric and national (in)action. Public Administration and Development,2002, vol. 22,pp. 322–333
[6] Garside, W., Cox, B., Big Data Storage for Dummies,Wiley, 2013.
[7]. K. Michael and M.G. Michael, “The Social and BehaviouralImplications of Location-Based Services,” J. Location-BasedServices, vol. 5, nos. 3-4, 2011, pp. 121-137.
[8]. F. Sestini, “Collective Awareness Platforms: Engines forSustainability and Ethics,” IEEE Technology and SocietyMagazine, vol. 31, no. 4, 2012, pp. 54-62.
[9]. M.G. Michael and K. Michael, “Towards a State ofUberveillance,” IEEE Technology and Society Magazine,vol. 29, no. 2, 2010, pp. 9-16.
[10]. M. Gagnon, J.D. Jacob, and A. Guta, “Treatment Adherence Redefined: A Critical Analysis of Technotherapeutics,” Nursing Inquiry, vol. 20, no. 1, 2013, pp. 60-70.
Citation
S Sharanya, L Shwetha, S Swarna S, A S Varsha, Veerseh Patil, "Progressive Digitalization of Public Agencies", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.148-152, 2019.
Communication for Motor Neuron Disease Patients Via Eye Blink to Voice Recognition
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.153-158, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.153158
Abstract
Inthispaper, we present a real time method based on some video and image processing algorithms for eye blink detection. The motivation of this researchis theneed of disabling whocannotcommunicatewithhuman. A HaarCascadeClassifieris appliedforface andeyedetectionforgettingeyeandfacialaxis information. In addition, thesame classifier is used based on Haar-likefeaturesto find out the relationship between the eyes and the facial axis for positioning the eyes. An efficienteyetrackingmethodis proposedwhichusesthepositionofdetected face. Finally, an eye blinking detection based on eyelids state (closeoropen) isused forcontrollingandroidmobilephones.The methodisusedwith andwithoutsmoothingfilter toshowthe improvement ofdetectionaccuracy. Theapplication isusedin realtime forstudyingthe effectoflightand distance between the eyes andthe mobile device in order toevaluate theaccuracy detectionandoverallaccuracyofthesystem. Testresults show that our proposed method provides a 98% over all accuracyand 100% detection accuracy for a distance of 35 cmand an artificial light.
Key-Words / Index Term
Face recognition ; Haar cascade classifier ;open cv
References
[1]. Starner, T., Weaver, J., Pentland, A.: A wearable computer based American sign language recognizer. Assist. Technol. Artif. Intell. 84–96 (2016)
[2]. Materka, A., Byczuk, M.: Alternate half-field simulation technique for SSVEP-based brain–computer interfaces. Electron. Lett. 42(6), 321–322 (2017)
[3]. Ghaoui, C.: Encyclopedia of Human Computer Interaction. Idea Group Reference (2016)
[4]. Thoumies, P., Charlier, J.R., Alecki, M., d’Erceville, D., Heurtin, A., Mathe, J.F., Nadeau, G., Wiart, L.: Clinical and functional evaluation of a gaze controlled system for the severely handicapped. Spinal Cord. 36, 104–109 (2015)
[5]. Gips, J., DiMattia, P., Curran, F., Olivieri, P.: Using EagleEyesan electrodes based device for controlling the computer with your eyes-to help people with special needs. In: Proceedings of the 5th International Conference on Computers Helping People with Special Needs, vol. 1, pp. 77–83 (2015)
[6]. Viola, P., Jones, M.: Rapid object detection using a boosted cascade of simple features. Computer Vision and Pattern Recognition, 2001. CVPR 2001. Proceedings of the 2001 IEEE Computer Society, vol. 1, pp. 511–518 (2009)
[7]. Oguz, O.: The proportion of the face in younger adults using the thumb rule of Leonardo da Vinci. J. Surg. Radiol. Anat. 18(2), 111–114 (2015)
[8]. Seki, M., Shimotani, M., Nishida, M.: A study of blink detection using bright pupils. JSAE Rev. 19, 49–67 (2014)
[9]. Kocejko, T., Bujnowski, A., Wtorek, J.: Eye mouse for disabled. Conference on Human System Interactions, pp. 199–202 (2008)
[10]. Horng, W.B., Chen, C.Y., Chang, Y., Fan, C.H.: Driver fatigue detection based on eye tracking and dynamic template matching. In: Proceedings of of IEEE International Conference on Networking, Sensing and Control, pp. 7–12 (2004)
[11]. Kro´lak, A., Strumiłło, P.: Fatigue monitoring by means of eye blink analysis in image sequences. ICSES 1, 219–222 (2006)
[12]. Zhou, Z.H., Geng, X.: Projection functions for eye detection. Pattern Recognit. 37(5), 1049–1056 (2004)
[13]. Kawaguchi, T., Hidaka, D., Rizon, M.: Detection of eyes from human faces by Hough transform and separability filters. In: Proceedings of International Conference on Image Processing, vol. 1, pp. 49–52 (2000) 14. Li, J.-W.: Eye blink detection based on multiple Gabor response waves. In: Proceedings of the 7th International Conference on Machine Learning and Cybernetics, pp. 2852–2856 (2008)
[14]. Bradski, G., Keahler, A., Pisarevsky, V.: Learning-based computer vision with intel’s open source computer vision library. Intel Technol. J. 9(2), 119–130 (2005)
[15]. Kro´lak, A., Strumiłło, P.: Eye-blink controlled human–computer interface for the disabled. Advances Intell. Soft Comput. 60, 133–144 (2009)
[16]. Yuille, A.L., Cohen, D.S., Hallinan, P.W.: Feature extraction from faces using deformable template. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 104–109 (1989)
[17]. http://www.a-s-l.co. Last visited May 2009
[18]. Magee, J.J., Scott, M.R., Waber, B.N., Betke, M.: EyeKeys: A real-time vision interface based on gaze detection from a lowgrade video camera. Conference on Computer Vision and Pattern Recognition Workshop, CVPRW ’04., pp. 159–159 (2004)
[19]. Yow, K.C., Cipolla, R.: Feature-based human face detection. Image Vis. Comput. 15(9), 713–735 (2016)
[20]. McKenna, S., Gong, S., Raja, Y.: Modelling facial colour and identity with gaussian mixtures. Pattern Recognit. 31(12), 1883–1892 2014)
[21]. Lanitis, C.J., Taylor, T.F.C.: An automatic face identification system using flexible appearance models. Image Vis. Comput. 13(5), 393–401 (2015)
[22]. Rowley, H.A., Baluja, S., Kanade, T.: Neural network-based face detection. IEEE Trans. Pattern Anal. Mach. Intell. 20(1), 23–38 (2012)
[23]. Osuna, E., Freund, R., Girosi, F.: Training support vector machines: An application to face detection. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition, pp. 130–136 (2014)
[24]. Rajagopalan, K., Kumar, J., Karlekar, R., Manivasakan, M., Patil, U., Desai, P., Poonacha, S., Chaudhuri: Finding faces in photographs. In: Proceedings of Sixth IEEE International Conference on Computer Vision, pp. 640–645 (1998)
[25]. Leinhart, R., Maydt, J.: An extended set of Haar-like features. In: Proceedings of International Conference on Image Processing, pp. 900–903 (2002)
[26]. Freund, Y., Schapire, R.E.: A short introduction to boosting. J. Jap. Soci. Artif. Intell. 14(5), 771–780 (2005)
[27]. Yang G., Huang, T.S.: Human face detection in complex background. Pattern Recognit. 27(1), 53–63 (2017)
[28]. Grauman, K., Betke, M., Lombardi, J., Gips, J., Bradski, G.R.: Communication via eye blinks and eyebrow raises: Video-based human–computer interfaces. Universal Access in the Information Society, 2(4), 359–373 (2002)
[29]. MacKenzie, I.S., Ashtiani, B.: BlinkWrite: efficient text entry using eye blinks. Universal Access in the Information Society, Online First (2010)
[30]. Magee, J.J., Scott, M.R., Waber, B.N., Betke, M.: EyeKeys: A real-time vision interface based on gaze detection from a low-grade video camera. Conference on Computer Vision and Pattern Recognition Workshop, pp.159–159 (2004)
[31]. Safety of laser products—Part 1: Equipment classification and requirements (2nd ed.), International Electrotechnical Commission (2007)
Citation
Ramya V, Riya Roy, Sriraksha K J, Swathi K, Supritha N, "Communication for Motor Neuron Disease Patients Via Eye Blink to Voice Recognition", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.153-158, 2019.
Medical Image Analysis using Machine Learning Techniques
Research Paper | Journal Paper
Vol.07 , Issue.15 , pp.159-163, May-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7si15.159163
Abstract
Image Processing has been a growing field for the biomedical images. MRI, CT scans and X-Ray are the different types ofimages used in this technique. All these techniques helps to identify even a minute deformity in the human body. The main purpose of medical image processing is to extract meaningful information from these images. MRI is the most reliable form of biomedical image available to us asit does not expose the human body to any sorts of harmful radiation. Once the MRI is obtained it can be processed, and the part of brain affected by tumor can be segmented. The complete process of detecting brain tumor from an MRI can be classified into four different categories: Pre-Processing, Segmentation,Feature Extraction and Tumor Detection. This survey involves analyzing and taking help of the research by other professionals and compiling it into one paper.
Key-Words / Index Term
OpenCV, Image Processing, Active contour, Machine Learning, Segmentation, Feature Extraction
References
[1] Justin Ker, Lipo Wang, Jai Raoi and Tchoyoson Lim, “Deep Learning Applications in Medical Image Analysis” IEEE Trans.Med. Imag., vol. 35, no. 5, pp. 13221331, December 29, 2017.
[2] Z. Akkus, A. Galimzianova, A. Hoogi, D. L. Rubin, and B. J. Erickson, ``Deep learning for brain MRI segmentation: State of the art and future directions,`` J. Digit. Imag., vol. 30, no. 4, pp. 449459, 2017.
[3] Natarajan P, Krishnan.N, Natasha Sandeep, Kenkre,Shraiya Nancy, Bhuvanesh Pratap Singh, "Tumor Detection using threshold operation in MRI Brain Images", IEEE International Conference on Computational Intelligence and Computing Research, 2012.
[4] M. Havaei et al., ``Brain tumor segmentation with deep neural networks,``Med. Image Anal., vol. 35, pp. 18_31, Jan. 2017.
[5] M. Alfonse and A.-B. M. Salem, “An automatic classification of brain tumors through MRI using support vector machine,” Egyptian Computer Science Journal, vol. 40, pp. 11–21, 2016.
[6] Komal Sharma, Akwinder Kaur, Shruti Gujral, “Brain Tumor Detection based on Machine Learning Algorithms”, International Journal of Computer Applications (0975 – 8887) Volume 103 – No.1, October 2014.
[7] S. Korolev, A. Safiullin, M. Belyaev, and Y. Dodonova, “Residual and plain CNN for 3D brain MRI classification.” Jan 2017 [Online] Available: htttps://arxiv.org/abs/1701.06643
[8] E.Ben George, M.Karnan, "MRI BrainImage EnhancementUsingFilteringTechniques", International Journal ofComputer Science & Engineering Technology, IJCSET, 2012.
[9] Daljit Singh, Kamaljeet Kaur,"Classification of Abnormalities in Brain MRI Images Using GLCM, PCAandSVM",International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-1,Issue-6, August 2012.
[10] Prachi Gadpayleand, P.S. Mahajani, "Detectionand Classification of Brain Tumor in MRI Images ",International Journal of Emerging Trends in Electricaland Electronics, IJETEE – ISSN: 2320-9569, Vol. 5, Issue. 1, July-2013.
[11] Shweta Jain, "Brain Cancer ClassificationUsing GLCM Based Feature Extraction in Artificial Neural Network" , International Journal of Computer Science & Engineering Technology ,IJCSET, ISSN : 2229-3345Vol. 4 No. 07 Jul 2013.
[12] WalaaHusseinIbrahim,Ahmed Abdel Rhman Ahmed Osman, Yusra Ibrahim Mohamed, "MRI BrainImageClassification Using Neural Networks" ,IEEE InternationalConference On Computing, Electricaland ElectronicsEngineering,ICCEEE,2013.
[13] Mehdi Jafari, Reza Shafaghi, "A Hybrid Approach for Automatic Tumor Detection of Brain MRI using Support Vector Machine and Genetic Algorithm", Global Journal of Science Engineeringand Technology, Issue-3, 2012.
[14] Noramalina Abdullah, Lee Wee Chuen,UmiKalthumNgah KhairulAzman Ahmad, "Improvement of MRI Brain Classification using Principal Component Analysis", IEEE International Conference on Control System, Computing and Engineering, 2011.
[15] Suchita Goswami, Lalit Kumar P. Bhaiya, " Brain Tumor Detection Using Unsupervised Learning based Neural Network", IEEE International Conference on Communication Systems and Network Technologies,2013.
Citation
Shubham Kumar Raj, Nitesh Kumar, Gopal Mani Dubey, Rajshekhar S A, "Medical Image Analysis using Machine Learning Techniques", International Journal of Computer Sciences and Engineering, Vol.07, Issue.15, pp.159-163, 2019.