{"title":"Mobile Application Development for West Bengal Tourism","authors":"","doi":"10.15864/ajac.2105","DOIUrl":"https://doi.org/10.15864/ajac.2105","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114733748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An empirical study on fall-detection using K-means based training data subset selection","authors":"","doi":"10.15864/ajac.2101","DOIUrl":"https://doi.org/10.15864/ajac.2101","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115741762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Study of Security and Privacy Challenges and their solutions in IoT data","authors":"","doi":"10.15864/ajac.2102","DOIUrl":"https://doi.org/10.15864/ajac.2102","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114825165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on SQL Injection Attack in Internet of Things","authors":"","doi":"10.15864/ajac.2106","DOIUrl":"https://doi.org/10.15864/ajac.2106","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classifying Infected and Uninfected Red Blood Cell Images for Malaria Detection using Convolutional Neural Networks","authors":"","doi":"10.15864/ajac.2107","DOIUrl":"https://doi.org/10.15864/ajac.2107","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"249 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113996717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Vision Based Pre-Processing System for Autonomous Vehicles","authors":"","doi":"10.15864/ajac.2103","DOIUrl":"https://doi.org/10.15864/ajac.2103","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115711970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rapid Measurement of Physical Quality of Dry Chili – A Machine Vision Approach","authors":"","doi":"10.15864/ajac.2104","DOIUrl":"https://doi.org/10.15864/ajac.2104","url":null,"abstract":"","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"28 24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128149128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nag Amitava, Arup Kumar Chattopadhyay, Maitra Paramita
{"title":"An Efficient (t,n) Threshold Secret Image Sharing Scheme Based on Thien-Lin Secret Image Sharing","authors":"Nag Amitava, Arup Kumar Chattopadhyay, Maitra Paramita","doi":"10.15864/AJAC.1401","DOIUrl":"https://doi.org/10.15864/AJAC.1401","url":null,"abstract":"In a (t, n) threshold secret image sharing scheme (TSIS), a secret image is first encoded into n pieces, normally referred as shares or shadow images. Those share-images can be stored or transferred safely as individually a share-image cannot reveal\u0000 any detail about the secret image. The receiver or user of the share-images referred as participants. If at least t(≤n) share-images are submitted by the participants, the secret image can be recomputed. One of the most popular secret image sharing schemes was proposed\u0000 by Thien-Lin (2002). The authors had proposed two versions of the scheme. The first version of SIS by Thien-Lin is efficient, but lossy as the pixel values more than 250 (< 256) are truncated to 250. The second one is lossless, but it increases the size of the secret image\u0000 during preprocessing. In this paper, we propose a secret image sharing scheme based on Thien-Lin scheme. We consider a little loss in the reconstructed image which is maximum one per pixel (the loss can be one to five in Thien-Lin scheme) and keep the size of the secret image same. Although\u0000 buffer pixels may be added for the sake of programming, after reconstruction of the secret image the buffer pixels are easily identifiable and can be safely removed.","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122990992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Clustering Techniques and Their Applications: A Review","authors":"Arjun Dutta","doi":"10.15864/AJAC.1404","DOIUrl":"https://doi.org/10.15864/AJAC.1404","url":null,"abstract":"This paper deals with concise study on clustering: existing methods and developments made at various times. Clustering is defined as an unsupervised learning where the targets are sorted out on the foundation of some similarity inherent among them. In the recent\u0000 times, we dispense with large masses of data including images, video, social text, DNA, gene information, etc. Data clustering analysis has come out as an efficient technique to accurately achieve the task of categorizing information into sensible groups. Clustering has a deep association\u0000 with researches in several scientific fields. k-means algorithm was suggested in 1957. K-mean is the most popular partitional clustering method till date. In many commercial and non-commercial fields, clustering techniques are used. The applications of clustering in some areas like\u0000 image segmentation, object and role recognition and data mining are highlighted. In this paper, we have presented a brief description of the surviving types of clustering approaches followed by a survey of the areas.","PeriodicalId":305694,"journal":{"name":"American Journal of Advanced Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116775390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}