{"title":"Effective Machine Learning Techniques used in Big Data Analytics","authors":"S. Senthil Kumar, V. Kathiresan","doi":"10.51983/ajsat-2017.6.1.942","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.942","url":null,"abstract":"Big data is a general term for massive amount of digital data being collected from various sources that are too large and raw in form. Big data deals with new challenges like complexity, security, risks to privacy. Big data is redefining the data management from extraction, transformation and processing to cleaning and reducing [1].There has been a lot of growth in the amount of data generated by web these days. The data has been so large that it becomes difficult to analyse it with the help of our traditional mining methods. Big data term has been coined for data that exceeds the processing capability [2]. Moreover, the rising data volume has contributed to the increasing demand for big data analytics.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":" 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132094497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Pradeep, S. Balasubramanian, Hemalatha Karnan, K. Karthick Babu
{"title":"Segmentation of Fused CT and MRI Images with Brain Tumor","authors":"K. Pradeep, S. Balasubramanian, Hemalatha Karnan, K. Karthick Babu","doi":"10.51983/ajsat-2017.6.1.945","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.945","url":null,"abstract":"This paper proposes an approach for combining two multimodality images [CT and MRI] with tumor cell, helps to delineate the anatomical and physiological differences from one dataset to another using Wavelet transform and its inverse transform. Image fusion is the process that matches two or more image datasets resulting in a single image dataset. There are many fusion processes that can take place at different levels, in this paper focuses on pixel level fusion process, where each pixel from the input images [CT and MRI] are taken as composite input data for further processing. In this project the next proposed step is to segment the tumor using Otsu’s Algorithm. Segmentation process is performed to detect the tumor from all the above three images i.e., CT, MRI and Fused Image by using OTSU’s segmentation algorithm for future comparison. The fused image contains both soft tissue information’s like Tumor and also hard tissues information’s like bones, helpful for physician and doctors to quantify the area of tumor for surgical planning. This paper also reduces the treatment cost to patient where there is no need of separate imaging device to obtain CT/MRI imaging modality.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fourier Transform Based Classification Aboriginal Algorithm","authors":"P. Senthil","doi":"10.51983/ajsat-2017.6.1.944","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.944","url":null,"abstract":"Object apprehension and article acceptance are capital apparatus of every computer eyes system. Despite the top computational complication and added problems accompanying to after adherence and accuracy, Zernike moments of 2D images (ZMs) accept apparent animation if acclimated in article acceptance and accept been acclimated in various angel assay applications. In this work, we adduce a atypical adjustment for accretion ZMs via Fast Fourier Transform (FFT). Notably, this is the aboriginal algorithm that can accomplish ZMs up to acutely high orders accurately, e.g., it can be acclimated to accomplish ZMs for orders up to 1000 or even higher. Furthermore, the proposed adjustment is as well simpler and faster than the added methods due to the availability of FFT software and hardware. The accuracies and after adherence of ZMs computed via FFT accept been confirmed using the orthogonality property. We as well acquaint normalizing ZMs with Neumann agency if the image is anchored in a beyond grid, and blush angel about-face based on RGB normalization of the reconstructed images. Astonishingly, higher-order angel about-face abstracts appearance that the proposed methods are superior, both quantitatively and subjectively, compared to the q-recursive method.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Ravichandran, R. Benjohnson, S. Lakshminarayanan
{"title":"Design and Development of Finical Frame on Reaction performance Expert Routing Protocol in Sloppy WSN","authors":"S. Ravichandran, R. Benjohnson, S. Lakshminarayanan","doi":"10.51983/ajsat-2017.6.1.939","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.939","url":null,"abstract":"Wireless Sensor Networks accept abundant abeyant to abutment several important wireless applications, together with concurrent disc statement, remedial application, inspection purpose sensor networks, automated applications, aggressive surveillance and home networking applications. But there are two arduous issues (i) advice bandwidth and (ii) activity are actual important to architecture wireless and adaptable systems because these are actual abundant bound in arrangement environment. Therefore it requires able advice and architecture techniques to access bandwidth as able-bodied as activity able protocol. The lot of able acquisition agreement Lower Activity Adaptive Absorption Hierarchy in wireless sensor networks. Lower Activity Adaptive Absorption Hierarchy uses the abstraction of activating absorption if sensor nodes are deploying about area amount of array ampules on the network. This cardboard describes the arrangement superior that depends on altered characteristics of abstracts manual as a Modification on LEACH protocol. In this paper, we discussed and explain the allegory of magnitude, phase, appearance delay, accumulation delay, amplitude of broadcasting and activity burning respectively.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta
{"title":"An Efficient Graphical Authentication System","authors":"Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta","doi":"10.51983/ajsat-2017.6.1.937","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.937","url":null,"abstract":"Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programming Fault Prediction Using Quad Tree-Based Fluffy C-Means Clustering Algorithm","authors":"S. Ravichandran, M. Umamaheswari, R. Benjohnson","doi":"10.51983/ajsat-2017.6.1.938","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.938","url":null,"abstract":"Software measurements and blame information having a place with a past programming form are utilized to construct the product blame expectation show for the following arrival of the product. Unsupervised procedures like bunching might be utilized for blame expectation as a part of programming modules, all the more so in those situations where blame marks are not accessible. In this paper a Quad Tree-based Fuzzy C-Means calculation has been connected for anticipating deficiencies in program modules. The points of this paper are twofold. In the first place, Quad Trees are connected for observing the underlying group focuses to be contribution to the Fuzzy C-Means Algorithm. An information edge parameter oversees the quantity of introductory bunch focuses and by shifting the limit the client can create wanted beginning group focuses. The idea of grouping increase has been utilized to decide the nature of bunches for assessment of the Quad Tree-based introduction calculation when contrasted with other instatement procedures. These bunches got by Quad Tree-based calculation were found to have most extreme pick up qualities. Second, the Quad Tree based calculation is connected for anticipating shortcomings in program modules. The general blunder rates of this forecast approach are contrasted with other existing calculations and are observed to be better in the vast majority of the cases.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan
{"title":"A Study on Queueing Systems Associated Random Evolutions With Branching Process","authors":"M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan","doi":"10.51983/ajsat-2016.5.2.934","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.934","url":null,"abstract":"In this paper we deal with branching process in which each particle procedure offspring at the time of completion of its life-time L according to a probability generating functions. We obtain an integral equation for the joint generating function of the vector process and limiting distribution.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123765303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hand Index: An Anthropo-Forensic Tool for Human Identification in India","authors":"Sangeeta Dey, Anup Kumar Kapoor","doi":"10.51983/ajsat-2016.5.2.936","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.936","url":null,"abstract":"The aim of the study was to determine and classify the hand index of 200 individuals selected randomly within age group 18 – 65 years from Udaipur district, Rajasthan, India. The measured parameters are hand length and hand breadth. This study also attempt to compare the hand index obtained from direct as well as indirect (from hand print & hand outline) methods. Data were analyzed using SPSS Statistical software. Results shows that there were statistically significant differences in the hand parameters of male compared to female subjects for all observed parameters. It is interesting that hand index obtained from different methods doesn’t indicate variation however there exist statistically significant variation in terms of hand length and hand breadth. Also there is statistically significant difference between the hand dimensions obtained from different methods. Hand classification denoted that population of Rajasthan state belongs to dolichocheir (dch) group of hand for all the direct and indirect methods. The comparison of hand index with populations of 17 different states of India indicates that Indian population belongs to any category of hand index except hyperbrachycheir. Also an attempt has been made to observe the correlative effect of climate divisions of India with the hand categories. Comparison with 25 other foreign countries shows the existence of hyperbrachycheir that is broader large palm but short fingers. This shows that morphological characteristics of hand depend on many factors such as gender, ethnicity, socio-cultural domain, environment & genetic factors and it differs from region to region. Thus, it can be said that Identification of hand parameters is very helpful in concealing identity of mutilated remains in any disastrous act, also in examination of chance evidences in crime scene for criminal proceedings and this comparative data of hand index can also help to determine the resident place of an unknown individual.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Indian Internet Context: The User Base and Speed – An Overview","authors":"P. K. Paul, A. Bhuimali, K. S. Shivraj","doi":"10.51983/ajsat-2016.5.2.933","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.933","url":null,"abstract":"India is one of the important name in today’s world in terms of popularity, democracy, development, socialism and ancient history and heritage. Though India holds the record of ancient world, but it is also changes itself and the process is continuing the latest technologies and tools have widely utilizing in almost all the sectors and fields. The internet systems has grown with rapid manner in the last few decades. The services and user base have been changed rapidly with the help of several latest internet services. The internet users are increasing day by day due to many reasons. Urban and rural, both the sectors have improving the dispatching of internet and removing digital divide in many contexts. The paper has highlighted many aspects related to the internet in Indian context.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Reni Sagayaraj, R. Sathishkumar, S. Anand Gnana Selvam
{"title":"A Study on Novel Method of Facial Image Compression Using Master Code","authors":"M. Reni Sagayaraj, R. Sathishkumar, S. Anand Gnana Selvam","doi":"10.51983/ajsat-2016.5.2.932","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.932","url":null,"abstract":"In this paper, face images are studied in the context of detection and recognition. In the literature, the problem of compressing human frontal facial images has been addressed. The images that are dealt are passport-type photos namely, full face, frontal view, plain background, no dark glasses, without hates and other non-standard clothing. Compression of Facial Images by using IDL is carried out in this paper. The facial images dealt with are passport-type photos-full face, frontal view. Three different photos of the same person are stored. A single code book is generated and compression is carried out. Appreciable PSNR values are obtained for different block sizes. This paper introduces a method to compress and decompress the facial image, so that it is visually appealing, at a quality sufficient to an un-mistakenly visually identify a given subject.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}