作者:
B MuthukumarJ Albert MayanGokul NambiarDenil NairProfessor
Department of Computer Science & Engineering Chennai Institute of Technology Chennai India Assistant Professor
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India U.G Students
Department of Computer Science & Engineering Sathyabama Institute of Science and Technology Chennai India
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, w...
The utility of a QR Code, is plenty in terms of usage to identify a particular entity. They are barcode of sorts that can hold a certain data set. Biometric security measures are one of the safest security measures, with fingerprint based biometric security being a rather easy and efficient way. In this paper, we discuss a way to efficiently check-in to a seat, during train travel by using a QR Code and fingerprint-based authentication system. A Quick Response Code (QR Code) can be used to mark one's attendance at their seat. Fingerprint authentication is the means to authenticate a person's identity without having to carry any form of physical identity proof along with them, during travel. Given the present system to check tickets is rather redundant and time consuming, having to manually check the ticket and identity of each passenger. By using this system, we can create a more efficient and less time-consuming system, that has much lesser probabilities of human error to occur.
the personalized web page recommendation for individuals is evident these days. Web servers are loaded with recommendation systems that analyze and recommend web pages to the users. They use data that are implicitly o...
详细信息
ISBN:
(纸本)9781538624609;9781538624593
the personalized web page recommendation for individuals is evident these days. Web servers are loaded with recommendation systems that analyze and recommend web pages to the users. They use data that are implicitly obtained as a result of web browsing patterns of the uses for recommending web pages. The cluster based association rule mining based system collects the web logs and generates a cluster of similar users and recommends pages to the users by actively analyzing them in the online. However, the time for analyzing it in online is more. To optimize this and increase the accuracy of the recommendation systems, a method that applies Naïve Bayes technique for clustering and firefly algorithm based similarity measure for optimization is designed. Web logs are initially clustered in offline by Naïve Bayes clustering technique. To find the similarity between the active user queries with other users in the same cluster in online, firefly algorithm based similarity measure is used. Firefly algorithm meticulously searches the generated cluster of web logs of the active user and recommends top pages. Firefly algorithm utilizes time efficiently, thus it is used for processing in online. When web pages are obtained, they are ranked and the top pages that are more relevant to the query are recommended. Efficiency of the system is evaluated using the measures like precision, recall, f - score, Matthews correlation and fallout rate. Experimental evaluation with real data set shows that the proposed system produced better recommendations and uses less time for computation in online.
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users...
This paper proposes a method for credit card transaction system which will make use of face recognition and face detection technology, using Haar Cascade and GLCM algorithm. The main problem faced by credit card users is attack to lot of privacy issues such as credit card. This generally happens when users give their credit card number to unknown people or when the card is lost. So, we are proposing a system that will reduce the risk of credit card frauds. The system we are proposing will match the image of user’s face with dataset of respective user. A database will be maintained for authentication purpose. If the image matches, that means user is genuine and he will be allowed to proceed otherwise, the user will be denied to do the transaction.
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT W...
IT Services are very much crucial for the smooth functioning of the system. And so is their administration. IT Services should be monitored at periodically for maintaining an efficient and productive system at an IT Workplace. Errors or Incident are bound to occur, which are then converted into 'Tickets'. Every ticket has a general format in which they are created. Tickets are then sent to the Admin side for the further resolution procedures. Classification of tickets is an instrumental step in which the emerged tickets from a monitoring system are classified using context basis. After this, all the tickets have a correct hierarchy, they are then sent to separate ticket resolution teams for the incident resolution.
Transportable specific web page pages comparison altogether from their work place partners in substance, format and usefulness. Likewise, current processes to apprehend malevolent websites are possibly no longer going...
Transportable specific web page pages comparison altogether from their work place partners in substance, format and usefulness. Likewise, current processes to apprehend malevolent websites are possibly no longer going to work for such pages. In this paper, we structure and actualize kayo, a machine that acknowledges pernicious and amiable portable webpage. we makes this warranty dependent on static highlights of a website web page going from the amount of iframes to the nearness of found out deceitful Smartphone numbers. Within the first vicinity, we tentatively display the requirement for transportable express structures and in a while recognize a scope of recent static highlights that profoundly relate with flexible malignant WebPages. We then observe to a dataset of extra than 350,000 known favorable and noxious versatile web page pages and showcase 90% precision in characterization. Additionally, we find, describe and document numerous internet site pages missed through Google secure browsing and virus general subsequently, we construct a application augmentation utilizing to defend clients from pernicious flexible web sites steadily. In doing as such, we give the primary static investigation strategy to differentiate malevolent transportable pages.
Mining client practices in portable situations is a developing and imperative theme in information mining fields. Past inquires about have consolidated moving ways and buy exchanges to discover versatile consecutive e...
Mining client practices in portable situations is a developing and imperative theme in information mining fields. Past inquires about have consolidated moving ways and buy exchanges to discover versatile consecutive examples. Be that as it may, these examples can't reflect real benefits of things in exchange databases. In this work, we investigate another issue of mining high utility versatile consecutive examples by coordinating portable information mining with utility mining. To the best of our insight, this is the primary work that joins versatility designs with high utility examples to discover high utility portable consecutive examples, which are portable successive examples with their utilities. Two tree-based strategies are proposed for mining high utility versatile successive examples. A progression of investigations on the execution of the two calculations are led through trial assessments. The outcomes demonstrate that the proposed calculations convey preferred execution over the cutting edge one under different conditions.
Cloud dealing with has changed into an essential bit of the reliably life. It basically made everyone life less troublesome with astounding highlights. To help broadening many of clients and more over keen gadgets, it...
Cloud dealing with has changed into an essential bit of the reliably life. It basically made everyone life less troublesome with astounding highlights. To help broadening many of clients and more over keen gadgets, it is depended upon to keep the cloud condition continuously secure and time tested. Scattered handling security has changed into a fundamental testing field at now a day. Here we introduced Man-made consciousness based structure that might be useful for an exposure of man-in-the-middle assault (MITM) in passed on figuring condition. As MITM strike winds up being eminent with the development of time, on the off chance that it is recognized at first, by then the assault might be limited. So we concentrated on assault region fragment to remain the cloud condition utilizing Man-made consciousness technique for thinking. Watchwords—Cloud enrolling condition, computerized reasoning method of reasoning, MITM strike.
作者:
Anidhya AthaiyaDeepa ModiGunjan PareekM.Tech Scholar
Department of Computer Science and Engineering wami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan Assistant Professor
Department of Computer Science and Engineering Swami Keshvanand Institute of Technology Management & Gramothan Jaipur Rajasthan
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data minin...
详细信息
ISBN:
(纸本)9781538647660
Word Sense Disambiguation (WSD) is the procedure of selecting precise sense or meaning for a word in a given context. Word sense disambiguation goes about as an establishment to different AI applications as data mining, information recovery, and machine interpretation. The issue solicits to figure out which sense from the polysemous word is appropriate in a given context. Previously a few methodologies have been proposed for WSD in English, German and so forth, however, work on WSD in Hindi is limited. In this work, a genetic algorithm based approach is presented for Hindi WSD. The feature of dynamic setting window is used which contains left and right expression of a vague word. The cardinal supposition of this approach is that the target word must have a common topic in its neighborhood. For finding all possible senses of an ambiguous word, WordNet created by IIT Bombay is used.
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor network environment for carrying out multiple tasks. Data packets transmitted in wireless sensor network needs to be protected. Securi...
详细信息
ISBN:
(纸本)9781538614433;9781538614426
A numbers of distributed autonomous sensor nodes are deployed in a wireless sensor network environment for carrying out multiple tasks. Data packets transmitted in wireless sensor network needs to be protected. Security keys can be generated and used to transmit data securely. These security key generation task needs to be properly managed in WSN. Efficient key management assists in providing confidentiality, integrity to the transmitted information. The security keys, if properly managed, blocks unauthorized users from accessing the transmitted data. Numerous key management mechanisms have been proposed in research literature. This proposed work presents a detailed survey performed on the current set of widely practiced key management techniques in WSNs. Both asymmetric encryption and hybrid type of encryption techniques are applied in key management. The survey presented analyzes the various key management techniques pertaining to computational overhead, communication complexity, energy consumption, robustness and scalability. The survey will be helpful for researchers in selecting the appropriate key management technique specific to their application needs.
The web has significantly affected all parts of every one of our students. As our students depend increasingly on the web, the constancy of web applications has turned out to be progressively critical. To make these a...
The web has significantly affected all parts of every one of our students. As our students depend increasingly on the web, the constancy of web applications has turned out to be progressively critical. To make these applications more tried and true, we will make a web application with respect to placement training. In general we have Indiabix and placement season are providing a wide range of both technical and aptitude questions in order to prepare a student for the placement. But somehow those questions are repeatedly asked are the standard questions are given. To improve this situation, in this paper, we propose a model of a web application. This structure utilizes the offline application capacity with all the questions are put away in the database and the questions will be refreshed progressively on a period premise with the assistance of the placement coordinator in the college. Every student can sign up and practice all the questions that are provided with respect to the subjects.
暂无评论