scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Engineering and Computer Science in 2018"


Journal ArticleDOI
TL;DR: IOTA is a revolutionary new, next generation public distributed ledger that utilizes a novel invention, called a “Tangle”, at its core, which has no Blocks, no Chain and also no Miners.
Abstract: IOTA is a revolutionary new, next generation public distributed ledger that utilizes a novel invention, called a “Tangle”, at its core. The Tangle is a new data structure based on a Directed Acyclic Graph (DAG). As such it has no Blocks, no Chain and also no Miners. Because of this radical new architecture, things in IOTA work quite differently compared to other Blockchains.

68 citations


Journal ArticleDOI
TL;DR: The results show that the proposed system yields good recognition rates which are comparable to that of feature extraction based schemes for handwritten character recognition.
Abstract: Handwritten character recognition has been one of the active and challenging research areas in the field of image processing and pattern recognition. It has numerous applications which include, reading aid for blind, bank cheques and conversion of any hand written document into structural text form. In this paper an attempt is made to recognize handwritten characters for English alphabets without feature extraction using multilayer Feed Forward neural network. Each character data set contains 26 alphabets. Fifty different character data sets are used for training the neural network. The trained network is used for classification and recognition. In the proposed system, each character is resized into 30x20 pixels, which is directly subjected to training. That is, each resized character has 600 pixels and these pixels are taken as features for training the neural network. The results show that the proposed system yields good recognition rates which are comparable to that of feature extraction based schemes for handwritten character recognition

19 citations


Journal ArticleDOI
TL;DR: It is found that KNN algorithm has much better performance than the other techniques used in comparison, which is proportionate to existing methods.
Abstract: Of all the deaths worldwide, the second most common cause of death is breast cancer. In 2011, the number of deaths was estimated to be 5.8 millions because of breast cancer. So, early diagnosis of cancer is very important. In this paper, machine learning techniques are explored in order to increase the accuracy of diagnosis. Methods such as CART, Random Forest, K-Nearest Neighbors are compared. The dataset used is obtained from UC Irvine Machine Learning Repository. The obtained accuracy prediction performances are proportionate to existing methods. However it is found that KNN algorithm has much better performance than the other techniques used in comparison.

8 citations


Journal ArticleDOI
TL;DR: A safety system which is integrated with the smart helmet and intelligent bike to reduce the probability of two-wheeler accidents and drunk and drive cases is built.
Abstract: The objective of this paper is to build a safety system which is integrated with the smart helmet and intelligent bike to reduce the probability of two-wheeler accidents and drunk and drive cases. The pressure sensor and the accelerometer sensor checks if the person is wearing the helmet or not. Alcohol sensors detects the alcoholic content in the rider’s breath. If the rider is not wearing the helmet or there is alcohol content found in rider’s breath, the bike remains off. The bike will not start until the rider wears the helmet and there is no alcoholic content present stating that rider did not consume alcohol. When the rider crashes, helmet hits the ground and sensors detect the motion and tilts of helmet and reports the occurrence of an accident and sends information of the location of accident to the family members of the rider and the emergency contact numbers.

8 citations


Journal ArticleDOI
TL;DR: It is proposed to implement a WSN platform that can be used for a range of long-term environmental data acquisition for IoT applications and describes a six-layered architecture of IoT and points out the related key challenges.
Abstract: Internet of things (IOT) Can be defined in many ways it encompasses many aspects of life such as connected homes, connected cities, connected cars and roads, roads to devices that track an individual’s behaviour. It is expected that one trillion Internet-connected devices will be available with mobile phones as the eyes and ears of the applications connecting all of those connected things. IoT made it possible for billions objects to communicate over worldwide over a public, private internet protocol network In 2010. In 2010 -11 the number of everyday physical objects and devices connected to the Internet was around 12.5 billion. The essential idea of the Internet of Things (IoT) has been around for nearly two decades, and has attracted many researchers and industries because of its great estimated impact in improving our daily lives and society. When things like household appliances are connected to a network, they can work together in cooperation to provide the ideal service as a whole, not as a collection of independently working devices. This is useful for many of the real-world applications and services, and one would for example apply it to build a smart residence; windows can be closed automatically when the air conditioner is turned on, or can be opened for oxygen when the gas oven is turned on. The idea of IoT is especially valuable or persons with disabilities, as IoT technologies can support human activities at larger scale like building or society, as the devices can mutually cooperate to act as a total system. WSNs are integrated into the “Internet of Things”, where sensor nodes join the Internet dynamically, and use it to collaborate and accomplish their tasks. Wireless sensor networks (WSN) are well suited for long-term environmental data acquisition for IoT representation. In this paper, it is proposed to implement a WSN platform that can be used for a range of long-term environmental monitoring for IoT applications. This paper presents functional design of WSN for IoT application. To provide a comprehensive overview of the IoT scenario and reviews its enabling technologies and the sensor networks. Also, it describes a six-layered architecture of IoT and points out the related key challenges

8 citations


Journal ArticleDOI
TL;DR: Finger reader with speech assistance is used to read any printed text from the mobiles, news papers etc to overcome difficulties faced by the visually impaired.
Abstract: In the present world visually impaired people use Braille lipi language to read the books, but those books are available only in particular places like library etc. It has become very difficult for the visually impaired peoples to come out into the real world. Braille cannot be used in every place like in the mobiles, supermarket, and news papers. Due to this it has become difficult for the visually impaired people to read the text. To overcome this difficulties faced by the visually impaired, finger reader with speech assistance is used to read any printed text from the mobiles, news papers etc. we are using the assistive technology in this device to provide the assistance for the visually impaired people

7 citations


Journal ArticleDOI
TL;DR: In this paper, it was found that the efficiency of the energy converter (i.e. water current turbine) increases with the increase of the angle of incidence, reaching a peak value of approximately 35.7% at 83 degrees, and then it decreases sharply with any further increase in the angle-of-incidence.
Abstract: The motivation that led to the writing of the present paper is the necessity to exploit the high-velocity energy of River Nile that obtained when River Atbara meets River Nile in Atbara town which is located in River Nile State. At the junction of the two rivers high-velocity energy is gained, and therefore, a suitable energy converter is needed to utilize this abundant energy. This research paper is a continuation of a series of researches executed by the Faculty of Engineering and Technology Atbara to utilize the hydraulic energy of River Nile and try to convert it into a suitable form of energy for the general good of the simple citizens of River Nile and the Northern States. It was found that the efficiency of the energy converter (i.e. water current turbine) increases with the increase of the angle of incidence. It reaches a peak value of approximately 35.7% at 83 degrees, and then it decreases sharply with any further increase in the angle of incidence.

6 citations


Journal ArticleDOI
TL;DR: The proposed vehicle is able to detect presence of fire and extinguishing it automatically by using gas sensor and temperature sensor, and will provide GUI for arduino operation using android.
Abstract: Now a days, fire accidents are very common and sometimes it becomes very difficult for a fireman to save someone’s life. It is not possible to appoint a person to continuously observe for accidental fire where robot can do that. Therefore in such cases fire fighting robot comes in picture . Robot will detect fire remotely. These robots are mostly useful in industries where probability of accidental fire is more. The proposed vehicle is able to detect presence of fire and extinguishing it automatically by using gas sensor and temperature sensor. It contains gear motors and motor driver to control the movement of robot . Relay circuit is used to control the pump and when it will detect fire then it will communicate with microcontroller (Arduino UNO R3) through Bluetooth module. The proposed robot has a water jet spray which is capable of sprinkling water. The sprinkler can be move towards the required direction .At the time of moving towards the source of fire it may happen that it will come across some obstacles ,then it has obstacle avoiding capability. It will provide GUI for arduino operation using android. It detects obstacles using ultrasonic sensors upto range of 80 m. Communication between the mobile phone and robot will take place through Bluetooth ,which will have GUI to control the movement of robot . When mobile gets connected to Bluetooth firstly it will set module name, baud rate . It is feasible to implement Bluetooth communication between smartphones and microcontroller. Android controlled robot can be used easily in everyday life such as in homes, market ,companies etc. The development of apps for Android in Android SDK is easy and free of cost.

6 citations


Journal ArticleDOI
TL;DR: From the experimental results, it is realized that the enhanced KMP algorithm gives better accuracy compared to other string matching algorithms.
Abstract: To analyze the content of the documents, the various pattern matching algorithms are used to find all the occurrences of a limited set of patterns within an input text or input document. In order to perform this task, this research work used four existing string matching algorithms; they are Brute Force algorithm, KnuthMorris-Pratt algorithm (KMP), Boyer Moore algorithm and Rabin Karp algorithm. This work also proposes three new string matching algorithms. They are Enhanced Boyer Moore algorithm, Enhanced Rabin Karp algorithm and Enhanced Knuth-Morris-Pratt algorithm. Findings: For experimentation, this work has used two types of documents, i.e. .txt and .docx. Performance measures used are search time, number of iterations and accuracy. From the experimental results, it is realized that the enhanced KMP algorithm gives better accuracy compared to other string matching algorithms. Application/Improvements: Normally, these algorithms are used in the field of text mining, document classification, content analysis and plagiarism detection. In future, these algorithms have to be enhanced to improve their performance and the various types of documents will be used for experimentation.

5 citations


Journal ArticleDOI
TL;DR: A Prototype Application of Banking Health Assessment Using Camels And Rgec Methods, the source of data to be used comes from the data of banking financial statements by OJK informed to the public.
Abstract: Health is important in many areas of life, both for people and companies. Healthy conditions will enhance work arousal and work ability and other abilities. With the rapid development of banks in Indonesia, among others, marked by the number of emerging banks, it is necessary a supervision of these banks. In this case Bank Indonesia as the central bank requires a control over the banks to know how the financial condition and business activities of each bank. Bank policies issued and implemented by Bank Indonesia are basically aimed at creating and maintaining health, both individually and banking as a system. The health or financial and non-financial condition of the bank is in the interest of all parties concerned, whether the owners, managers (management) of the bank, the community using bank services (customers) and Bank Indonesia as the supervisory authority of banks and other parties. The condition of the bank may be used by such parties to evaluate the bank's performance in applying prudential principles, compliance with applicable regulations and risk management. The development of the banking industry, especially the increasingly complex and diverse products and services will increase the risk exposure facing banks. The problems that arise in the general public is the absence of tools or information system applications how carannya know that the bank where they save the funds is the bank in a healthy condition. Referring to these issues we will create a Prototype Application of Banking Health Assessment Using Camels And Rgec Methods, the source of data to be used comes from the data of banking financial statements by OJK informed to the public. Our research is a kind of applied research (Applied Research). The results can be directly applied to solve the problems encountered. In this research will be made Prototype Application of Banking Health Assessment Using Camels And Rgec Method With Utilization of Data Financial Reports of OJK Banking. The results of the prototype of the application is expected to be used to measure the health of a bank.

5 citations


Journal ArticleDOI
TL;DR: The Obstacle Detection and Alert System (ODAS) both incorporated as a single system for the obstacles such as speed breakers, barricades on the road using Internet of Things, which provides audible and visual alert about road obstacles.
Abstract: Recent development of the Internet of Things (IoT) and Smart Things provides an opportunity for the informationization for the automotive industry. This article describes Obstacle Detection and Alert System (ODAS) both incorporated as a single system for the obstacles such as speed breakers, barricades on the road using Internet of Things. Obstacle detection system uses in-built algorithm to detect an obstacle on the road using minimal vehicle parameters such as vehicle speed, steering angle. Obstacles locations thus marked by the detection system are stored locally and uploaded to cloud from time-to-time. Cloud server processes data from different vehicles and finalizes that there is a real obstacle at the particular location based on its own algorithm. Obstacles locations thus confirmed by the cloud server are downloaded to obstacle alert system from time-to-time, which alerts the driver about the obstacle on the road when the driver is nearing the location of the obstacle. This system also provides option to see obstacles location super-imposed on google maps so that user can plan his efficient route in advance. Existing systems only have road sign indications for obstacles such as speed breakers, barricades which the driver might not notice during driving, especially at night times. Existing google maps data do not have option to find road obstacles such as speed breakers, barricades information on it. The system aims to overcome these short-comings by a dedicated system which provides audible and visual alert about road obstacles.

Journal ArticleDOI
TL;DR: In this article, a research was conducted to make the application related to the obligatory multimedia-based prayer guidance, so that students are easier to remember, understand and study the prayer guidance.
Abstract: Pesantren Arafah Kota Sungai Penuh is a boarding school attached to Islamization, where every student is required to be able to perform the prayer properly and correctly. With the current teaching-learning process, while teacher still using gestures or still using whiteboards and markers as a medium of learning, so students tend to get bored and difficult to understand, memorize and learn that is taught by the teacher. This research was conducted to make the application related to the obligatory multimedia-based prayer guidance, so that students are easier to remember, understand and study the prayer guidance. The methods used in making this application include; analyze the problem, make designing, make the application program using Macomedia flash 8 software ends by testing. This app consists of three most important parts. First, the input contains the data required in this application. Second, the file that serves as a liaison between the flash and then the data will be displayed into the flash. And third, is making the application on flash as the end of this application. From the results of application testing mandatory prayer-based multimedia can be obtained that by using this application students learn more easily to understand a material. With the construction of multimedia-based applications is expected to increase student motivation in learning and can be easy to memorize, understand and study the mandatory prayer guidance.

Journal ArticleDOI
TL;DR: The design and implement is designed and implemented in such a way that the robotic vehicle can enter into an area of higher risks, move and place wherever the object wants to go and captures intruder’s image.
Abstract: In today‟s world Indian border military force is facing a huge destruction. Hence, most of the military organizations take the help of military robots to carry out risky jobs which cannot be handled by humans. In this proposal, we design and implement in such a way that the robotic vehicle can enter into an area of higher risks, move and place wherever the object wants to go and captures intruder‟s image. It has human detection Pi camera and temperature and gas detecting sensor that can provide precaution to potential crimes, fire and leakage of any gases. The credit card sized Raspberry Pi with Open Source Computer Vision (OpenCV) software controls the face detection algorithm and sends captured pictures to the user‟s email via WI-FI. The pi-camera serves as the eye of the robot and provides us live video streaming. The biggest advantage of the system is that the user can get the picture of the intruder from anywhere in the world and can respond according to the risks in the situations. The prime objectives of this paper are:  To find the presence of an intruder if detects, captures images and sends it to the given email address.  Enables control of the robotic vehicle –i.e. The robot can be moved in any directions from the user present in any location.  To find the presence of any gases present in the surrounding other than the normal air and warns the nearby person with its buzzing.  Can monitor the location at any remote distance via live surveillance.  To find the temperature of the environment Keywords— Robot, Raspberry pi, surveillance, defense, human detection.

Journal ArticleDOI
TL;DR: This project presents a modern approach for surveillance at remote and border areas using multifunctional robot based on current IOT used in defense and military applications.
Abstract: This project presents a modern approach for surveillance at remote and border areas using multifunctional robot based on current IOT used in defense and military applications. This robotic vehicle has ability to substitute the solider at border area t provide surveillance. The robotic vehicle works both as autonomous and manually controlled vehicle using internet communication medium.This multisensory robot used to detect presence of enemy capture it in camera and give the live streaming to the authorized person Surveillance is major role while we workin on border area for this there is robot for surveillance purpose.This paper presents a smart surveillance robot for military application by using Raspberry Pi for security purpose. An field Raspberr pi sends a wireless command which is received by Authorized person on web Page and accordingly robot moves. The Video Streaming is done using Raspberry pi camera. The Raspberry pi programming is done in python language. The experimental result shows that the video streamed up to 15 frames per second.

Journal ArticleDOI
TL;DR: The multimedia that has been developed as a good qualification and is good for use in the process of teaching the topics of line and angle is shown to be valid.
Abstract: This study was aimed at : (1) developing an instructional multimedia design for teaching line and angle to the seventh grade students of junior high school; (2) describing the result of the implementation of the multimedia using GeoGebra as media of exploration, Camtasia Studio as an application for sound and video editing, Lectora Inspire as the application for making layout and quiz;(3) finding out the validity of the multimedia for teaching line and angle to the seventh grade students of junior high school. The study used DDD-E model that consists of deciding, design, develop, and evaluate stages. The product was tried out in several stages which were done by instructional materials experts, and students at different schools and used qualitative and descriptive quantitative data analysis techniques. The result showed that the multimedia for teaching line and angle could be accepted as instructional media with the average score of 43.5 from the instructional material experts falling into valid criterion, and the mean score given by the material experts was17 falling into valid criterion. The multimedia that has been developed also got a very good response from the students with the average score of 47.63. Based on the result that has been obtained, the multimedia that has been developed as a good qualification and is good for use in the process of teaching the topics of line and angle.

Journal ArticleDOI
Yogesh Pawar1
TL;DR: An android application to find your mobile phone using other devices when you lost it nearby, using text message and unique code generated on both devices, designed in such a way that the authors can ring phone even when it is on silent mode.
Abstract: Now a day's android applications are making our life much easier and happier. We always ensure that device that contains all applications should be always with us and secure anytime anywhere. In this journal I developed an android application to find your mobile phone using other devices when you lost it nearby, using text message and unique code generated on both devices. The application is designed in such a way that we can ring phone even when it is on silent mode. For developing this application I proposed a method, I simply divided code modules of Android functions, so that we can able to invoke each module of android device separately to ring, vibrate and other function. Each android module will take the device administrator permission to modify android function using application.

Journal ArticleDOI
TL;DR: This paper presents a review of ECC-based RFID authentication schemes in terms of performance and security, and finds that there are three recently proposed systems that cannot satisfy all security requirements and have satisfactory performance.
Abstract: Advances in information and communication technologies have led to the emergenceof Internet of Things. In the healthcare environment, the use of IoT technologies brings convenience to physicians and patients as they can be applied to various medical areas such as constant real-time monitoring, patient information management, medical emergency management, blood information management, and health management. The Radio-Frequency Identification technology is one of the core technologies of IOT deployments in the healthcare environment. To satisfy the various security requirements of RFID technology in IOT, many RFID authentication schemes have been proposed in the past decade. Recently, elliptic curve cryptography based RFID authentication schemes have attracted a lot of attention and have been used in the healthcare environment. In this paper, we discuss the security requirements of RFID authentication schemes, and in particular, we present a review of ECC-based RFID authentication schemes in terms of performance and security. Although most of them cannot satisfy all security requirements and have satisfactory performance, we found that there are three recently proposedsystem.

Journal ArticleDOI
TL;DR: This paper presents a tool from which requirements are read from user in natural language or file and generated into words whereby the user makes some selections and maps the selected words directly to components architecture.
Abstract: Building software architectures from a set of requirements has been an area of research where programmers, architects and software engineers spend a lot of time using their expertise in resolving peculiar problems of mapping requirements to architectures. Some of these problems are directly associated with the ambiguity, incompleteness and inconsistency of requirements which draw a wide gap between the informal and formal specification of these requirements. The main objective here is to reconcile the mismatch in-between these domains by providing a systematic mapping technique. This paper presents a tool from which requirements are read from user in natural language or file and generated into words whereby the user makes some selections and maps the selected words directly to components architecture. Based on the design of this tool, human heuristic is used in the selection of the words. Unlike components, connectors are set as static. Partial architecture of requirements is drawn incrementally until complete system architecture is constructed.

Journal ArticleDOI
TL;DR: The proposed system will provide database management for employee details, which includes prediction algorithm for predicting site details depending on customer needs and advantage of no data duplication, data prediction and easy data backup with a user friendly interface.
Abstract: Automation plays very important role in our lives. It makes the work easier and simpler so for simplified and easy living. Government of India has proposed Digital India campaign. Making this campaign successful involves reducing conventional methods used by small scale industry. Contributing to this campaign we are proposing a solution for business industry to reduce their paper work. The proposed system will provide database management for employee details. Along with this other modules of the system includes prediction algorithm for predicting site details depending on customer needs. The concept of Office Automation system provides advantage of no data duplication, data prediction and easy data backup with a user friendly interface. Overall project is divided into four modules and these modules can be accessed by admin and supervisor. Admin is authorized to log in and add details worker, client, vendor and also allowed to view the database and update the worker details.

Journal ArticleDOI
TL;DR: An overview of current authors’ field experience of using CRIU for checkpoints and restores of computing containers with HPC applications and problems associated with providing the same features for distributed MPI applications are discussed.
Abstract: The paper provides an overview of current authors’ field experience of using CRIU for checkpoints and restores of computing containers with HPC applications. Docker and Singularity containers are considered. Reasonable results are obtained for locally running applications. Problems associated with providing the same features for distributed MPI applications are discussed, and possible solutions are outlined with the regard to current state of development of CRIU, Docker, Singularity, Open MPI and competing technologies.

Journal ArticleDOI
TL;DR: Detailed survey of botnet and it’s regarding features is focuses on prevention, control and repair services.
Abstract: Internet of things is talk of the town now a days but the potential threat IoT has over the cyber safety is less emphasized. The possibility for attackers with all systems interconnected with no or less security measures installed in them, makes them vulnerable to all kinds of security attacks. Botnet consists of collection of private computers interconnected together and affected by malicious software, which can be controlled as a group without the owner’s knowledge. BotNet is roBot and Network combination, the bot here is the compromised device. Denial of service, spyware, email spam, click fraud, bit coin etc., and are some of the well-known attacks by botnet. Botnet control itself has become a community, which focuses on prevention, control and repair services. This paper focuses on detailed survey of botnet and it’s regarding features.

Journal ArticleDOI
TL;DR: It was seen that the study is capable of measuring required rotation data with an error less than 1% and wireless communication is securely provided and there occurred no data loss.
Abstract: In this study, speed/position control of real time static magnetic Direct Current (DC) motor which can communicate with wireless using Matlab platform and PIC microcontroller was carried out. The study consists of three sections: developing DC motor speed/position unit, developing wireless communication module, and developing Matlab-Gui user interface. In the study, PIC16F876A was used as microcontroller, 2x16 character LCD screen was used as real time user interface, HC-05 Bluetooth adaptor was used for Bluetooth communication, and Matlab-Gui program was used as computer interface. An application card was designed for the user to carry out speed and position control of a DC motor which is in real environment and it was achieved. As a result of the experiments conducted, it was seen that the study is capable of measuring required rotation data with an error less than 1%. Data of position is again obtained from optical encoder. Wireless communication is securely provided and there occurred no data loss. Speed/position control of the wireless DC motor with high resolution and security was achieved with this study

Journal ArticleDOI
TL;DR: This paper will break down the acknowledgment of Web content mining and Web structure mining, their essential algorithms standards, and their application areas.
Abstract: The fast growth of the Internet, we have entered a period of information explosion, there is a considerable measure of repetitive data in the Network. How to extract a useful part of this information from the massive information resources, dissecting the huge measure of data lastly get the potential information we need to extracted. Web mining innovation appeared and spared out the human from the data sea. This paper will break down the acknowledgment of Web content mining and Web structure mining, their essential algorithms standards, and their application areas.

Journal ArticleDOI
TL;DR: This paper shows how Influential's originate relevant information which satisfies the information needs of a compelling dissemination information and further how specific behaviour information may grant the recognization about influence communications in an online media.
Abstract: Influential users perform a crucial aspect in online media since users serve to have a strike to each other. In this paper, Influential's originate relevant information which satisfies the information needs of a compelling dissemination information and further how specific behaviour information may grant the recognization about influence communications in an online media. Understanding information dissemination processes that existing in online media, is an elementary mark approaching to the construction of powerful information dissemination system, support system, and growing marketing skills in the digital environment. Moreover, there are couple of major approaches of information dissemination are influence and relevance. Strength of popularise information in a social media is the influence

Journal ArticleDOI
TL;DR: Algorithm based frameworks for predicting software development effort which can generate the best-optimized software product are compared.
Abstract: The need for accurate effort predictions for projects is one of the most critical and complex issues in the software industry. Effort estimation is an essential activity in planning and monitoring software project development to deliver the product on time and within budget. The competitiveness of software organizations depends on their ability to predict the effort required for developing software systems accurately. Several algorithmic approaches have been proposed in the literature to support software engineers in improving the accuracy of their estimations. The decision of how to select different techniques considering the characteristics of a specific dataset through genetic algorithms could be viewed as a search-based problem for software engineering. Some groups use well known evolutionary learning algorithms (MMRE, PRED (25), PRED (50) and PRED (75), while others use machine learning methods like artificial neural network and fuzzy logic. Analogy estimation is also being utilized for estimating software effort, which has been shown to predict accurate results consistently. Genetic frameworks are becoming famous for selecting best learning schemes for effort prediction using the elitism techniques, utilizing some well-known parameters like Spearman's rank correlation, the median of the magnitude of relative error (MdMRE), and mean of the absolute residuals (MMAR). The technique of using fuzzy rough sets for the analysis is also becoming popular. This article aims to compare various algorithm based frameworks for predicting software development effort which can generate the best-optimized software product.

Journal ArticleDOI
TL;DR: The automation of quality assessment in mangoes using computer vision is addressed, namely the number of surface injuries and the time-to-maturity of the fruit.
Abstract: Food processing industry requires precise and accurate quality assessment of products. This assessment effects the price of product and also the storage and transport decisions. This paper intends to address the automation of quality assessment in mangoes using computer vision. The paper addresses two issues, namely the number of surface injuries and the time-to-maturity of the fruit. A visible spectrum image of the fruits is considered to extract the Region of Interest(RoI), which contain the fruit with minimal background. Each RoI is further subjected to segmentation techniques so as to identify the injured patches as well as the portion of immature(green) area on the fruit surface. The percentage of these areas is used to determine the grade and the time-to-maturity respectively for each product.

Journal ArticleDOI
TL;DR: This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption.
Abstract: with the rapid increase of technology, the data stored and transmitted among the client and server has been increased tremendously. In order to provide high security for the confidential data, there is a need for proper encryption techniques that are to be followed by the concerns. This paper presents an analysis of the various encryption algorithms and their performance on handling the private data with authentication, access control, secure configuration and data encryption. Document oriented databases such as MongoDB, Cassandra, CouchDB, Redis and Hypertable are compared on the basis of their security aspects since they manipulate the huge amount of unstructured data in their databases. It is proposed that each database has its own security breaches and emphasises the need for proper encryption methods to secure the data stored in them.

Journal ArticleDOI
TL;DR: A new method for edge detection of image segmentation using cellular automata with modification for game of life rules and K-means algorithm and the semi-supervised clustering method, which can jointly learn to fusion by making use of the unlabeled data is presented.
Abstract: Semi-Supervised Learning is an area of increasing importance in Machine Learning techniques that make use of both labeled and unlabeled data. The goal of using both labeled and unlabeled data is to build better learners instead of using each one alone. Semi-supervised learning investigates how to use the information of both labeled and unlabeled examples to perform better than supervised learning. In this paper we present a new method for edge detection of image segmentation using cellular automata with modification for game of life rules and K-means algorithm. We use the semi-supervised clustering method, which can jointly learn to fusion by making use of the unlabeled data. The learning aim consists in distinguishing between edge and no edge for each pixel in image. We have applied the semi-supervised method for finding edge detection in natural image and measured its performance using the Berkeley Segmentation Dataset and Benchmark dataset. The results and experiments showed the accuracy and efficiency of the proposed method.

Journal ArticleDOI
TL;DR: A novel model: soft-computing model in analyzing big data that focuses on voluminous data while addressing data velocity, which is based on Unified Modeling Language (UML).
Abstract: This research paper has designed a novel model: soft-computing model in analyzing big data. It focuses on voluminous data while addressing data velocity. The model comprises of mediator, data filter, collector, predictor and acceptor, all model components. The enhancement of data volume is handled using data filters while data velocity is handled using predictor. Unified Modeling Language (UML) portrays the behavioral functionalities of the model. The proffered benefit of the model will be explored on full implemented.

Journal ArticleDOI
TL;DR: An Cyber threat Intelligence (CTI) collection, log analysis and automated Threat alerting platform capable to analyze and respond to incidents that can lead to cyberattacks is proposed.
Abstract: Cyberattacks, ever increasing in severity, complexity and frequency are impacting the functioning of citizens, government, and businesses around the world. Protecting valuable intellectual property, business and personal information in digital form against theft, misuse, is an increasingly critical concern for everyone in the present digital era. The financial and reputational loss incurred due to Cyber-attacks motivate organizations to improve defensive measures to protect their organizational networks and information stored. This paper proposes an Cyber threat Intelligence (CTI) collection, log analysis and automated Threat alerting platform capable to analyze and respond to incidents that can lead to cyberattacks. The proposed system makes use of CTI received from Open Source intelligence (OSINT), Elasticsearch and Logstash to analyze, observe and generate alerts for malicious traffic/ activity in organization based on log analysis. At the same time an easy to understand visual representation can be made by the use using Kibana.