Koomesh最新文献

筛选
英文 中文
Survey on Different Data Mining Techniques for Prediction 面向预测的不同数据挖掘技术综述
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653734
P. Akulwar, Sujata Pardeshi, Arvind Kamble
{"title":"Survey on Different Data Mining Techniques for Prediction","authors":"P. Akulwar, Sujata Pardeshi, Arvind Kamble","doi":"10.1109/I-SMAC.2018.8653734","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653734","url":null,"abstract":"Data Mining has wide applicability due to wide ease of use of large amount of data and requirement of storage as per the need. Data mining techniques are widely useful in educational data mining for analysis of student data. The different data mining techniques such as classification, clustering, association rule mining, decision tree etc. are used in educational field for analyzing student’s performance, mindsets, forecasting their result and grouping them as per defined category. These techniques are also used for finding various patterns. Educational data mining helps for improving student’s performance, for managing the student database and for managing the institute. This paper focuses on different data mining techniques that are useful for predicting student performance.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"80 1","pages":"513-519"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83422384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Social Champion Identification for NGOs 非政府组织社会冠军识别
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653753
Utsav Das, Arvind Narayanan, Aman Gupta, Onkar Singh Bagga, Shalu Chopra
{"title":"Social Champion Identification for NGOs","authors":"Utsav Das, Arvind Narayanan, Aman Gupta, Onkar Singh Bagga, Shalu Chopra","doi":"10.1109/I-SMAC.2018.8653753","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653753","url":null,"abstract":"In this paper, we attempt to provide a recommender system to help NGOs select motivated and passionate individuals to promote their cause on social media by evaluating their digital social profiles. We have taken Twitter as the social medium due to its relatively easier access to user data and tweets. The best fit for a particular NGO would be the person who has both influence within her digital social network as well as writes and posts on matters relevant to the NGO. To achieve this ranking, we break down the profile of the candidate into three metrics: Influence, Engagement and Relevance. These three metrics provide quantitative scores of the influence the candidate has over her network, how engaged her follower base is and how relevant the topics the candidate talks about is to the NGO’s work respectively. The first metric uses the TwitterRank algorithm to measure the influence the user has on his follower base. Engagement quantifies the way the follower base reacts to the posts through likes and retweets. Finally, we implement topic modelling with LDA to quantify the relevance of the candidate’s tweets to the NGO’s areas of interest. We consider whichever topic the NGO provides as the domain on which it requires candidates and hence, this system can be used by any organization to find persons of interest on Twitter.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"37 1","pages":"361-366"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87086315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Latent Fingerprint Enhancement Using Sparse Representation 基于稀疏表示的潜在指纹增强
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653673
Minal Tandale, S. Panbude
{"title":"Latent Fingerprint Enhancement Using Sparse Representation","authors":"Minal Tandale, S. Panbude","doi":"10.1109/I-SMAC.2018.8653673","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653673","url":null,"abstract":"Latent fingerprints are fingerprints which are smudged, overlapped, and distorted. They are poor quality images with unclear ridge structure. Latent fingerprints are seen at crime scene, so it plays a vital role in identifying and declaration of criminal in law enforcement.Therefore it is important to enhance the latent finger prints which are distorted by most of the non-finger print patterns. By enhancing the latent fingerprints it becomes easy to match with the large database of know persons fingerprints.By seeing the advances of sparse representation in image denoising, the work proposes the method of enhancement using sparse representation. In Sparse representation initially total variation model will be used for latent fingerprint image, where image is disintegrated into cartoon and texture components. Cartoon component contains noise, which will be discarded while texture component contains main information. Second sparse enhancement algorithm is implemented on texture component of the image. Experimental results are carried on NIST SD4 to show the results of the proposed algorithms.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"137 1","pages":"671-675"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86618294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Survey on Multiprotocol Label Switching in Virtual Private Networks 虚拟专用网中多协议标签交换研究进展
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653745
K. M. M. Fathima
{"title":"A Survey on Multiprotocol Label Switching in Virtual Private Networks","authors":"K. M. M. Fathima","doi":"10.1109/I-SMAC.2018.8653745","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653745","url":null,"abstract":"When a customer browses internet or sends files (upload/download), the request reaches the DNS (Domain Name System) in the network and does lookup for IP address of the corresponding URL (viz.,www.google.com). Then the request gets transformed to packets and traverses in the internet. The router builds the routing table for the packets based on the source ip and destination ip addresses of the packets. For better security purposes, we need to protect the data by way of encryption i.e. covering up of the packet. Hence we are hiding the information from the hackers. This can be implemented by cisco’s MPLS VPN (Multi Protocol Label Switching – Virtual Private Networks). The VPN network is formed by routes named vrf (virtual routing and forwarding). The vrf identifiers distinguish the routes between different customers landing the ISP (Internet Service Provider) routers. Apart from the existing network, the packets travel in an MPLS enabled ISP network. This results in better security, privacy, reliability, latency and enables fast transmission of data.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"13 1","pages":"737-740"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83317812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Design of Two Stage CMOS Op-Amp with High Slew Rate and High Gain in 180nm 180nm高摆率高增益两级CMOS运算放大器设计
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653750
Akhil Gupta, Shweta Singh
{"title":"Design of Two Stage CMOS Op-Amp with High Slew Rate and High Gain in 180nm","authors":"Akhil Gupta, Shweta Singh","doi":"10.1109/I-SMAC.2018.8653750","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653750","url":null,"abstract":"This paper present a CMOS two stage op-amp using 180nm technology. Keeping the 1.8 V dc supply with 50uA bias current this amplifier produces a gain greater than 66dB along with a very high slew rate of 95 V/us. On decreasing the current the gain can be increase but the slew rate will also decrease which will going to effect the sensitivity of the amplifier. Therefore a high slew rate amplifier has design along with high gain without any much power consumption. The various parameter such as Gain Bandwidth Product, Phase margin, Power consumption are measured. The results shows that the on decreasing the size of MOSFETs the power dissipation also decreases.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"2 1","pages":"341-345"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82610669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
IOT Based No-parking Notifier System 基于物联网的禁止停车通知系统
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653775
Sanjith. M. Gowda, G. Sushanth, S. Sujatha
{"title":"IOT Based No-parking Notifier System","authors":"Sanjith. M. Gowda, G. Sushanth, S. Sujatha","doi":"10.1109/I-SMAC.2018.8653775","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653775","url":null,"abstract":"Traffic congestion due to vehicles parked in No-parking zones has become a serious problem in major cities of India. Due to traffic congestion environment, economy and overall quality of life is affected. Hence it is high time to effectively manage the traffic congestion problem. With increase in number of vehicles, discipline in road regulation or traffic system becomes mandatory. The existing traffic system is very accurate but not efficient enough to monitor all the vehicles on the road. With the advent of new technology this problem can be tackled by using Wi-Fi enabled micro-controllers, RFID and cloud systems to monitor every vehicle on the road all the time. This becomes easy for the government in regulating its traffic rules with high efficiency without affecting the smoothness of the traffic.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"18 1","pages":"108-110"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72648232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Optimized Deployment of Roadside Unit in VANET for Urban Area to Reduce the Cost of Deployment 优化城区VANET中路边单元的部署,降低部署成本
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653650
Abantika Choudhury
{"title":"Optimized Deployment of Roadside Unit in VANET for Urban Area to Reduce the Cost of Deployment","authors":"Abantika Choudhury","doi":"10.1109/I-SMAC.2018.8653650","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653650","url":null,"abstract":"This paper concentrates over optimal deployment of Road Side Unit in a road network for communication with Vehicular Ad-Hoc Networks. Vehicular Ad-hoc networks comprises of moving vehicles communicating with each other via wifi and also some vital components like Roadside unit and On-Board Unit. Roadside Units are placed across the road for infrastructure communication. But the deployment cost of Roadside unit is very high, so, our goal is always to optimally place limited number of Roadside unit in a given region and to achieve maximum performance as well. In this paper, an algorithm is presented, the performance of the algorithm shows better results compared to other existing ones. Proposed algorithm uses selected deployment of Roadside unit and vehicle to vehicle communication in between two intersecting points of a road.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"53 1","pages":"272-277"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79294180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Prominence Of ECDSA Over RSA Digital Signature Algorithm ECDSA相对于RSA数字签名算法的优越性
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653689
Dhanashree Toradmalle, Rohan Singh, Het Shastri, N. Naik, Vishal Panchidi
{"title":"Prominence Of ECDSA Over RSA Digital Signature Algorithm","authors":"Dhanashree Toradmalle, Rohan Singh, Het Shastri, N. Naik, Vishal Panchidi","doi":"10.1109/I-SMAC.2018.8653689","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653689","url":null,"abstract":"Digital signatures are replacing paper-based work to make life easier for customers and employees in various industries. We rigorously use RSA and Elliptic Curve Cryptography (ECC) for public key cryptographic algorithms. Nowadays ECDSA (Elliptical Curve Digital Signature Algorithm) gaining more popularity than the RSA algorithm because of the better performance of ECDSA over RSA. The main advantage of ECC over RSA is ECC provides the same level of security with less key size and overhead than RSA. This paper focuses on a brief review of the performance of ECDSA and RSA in various aspects like time, security and power. This review tells us about why ECC has become the latest trend in the present cryptographic scenario.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"99 1","pages":"253-257"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78551091","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
WAAM Web & Android Authentication Model using Improvised User Identification and Verification Technique using Biometric and Digital Certificate 基于生物特征和数字证书的简易用户识别和验证技术的WAAM Web & Android认证模型
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653703
Abhijeet Anil Khandre, S. Shikalpure
{"title":"WAAM Web & Android Authentication Model using Improvised User Identification and Verification Technique using Biometric and Digital Certificate","authors":"Abhijeet Anil Khandre, S. Shikalpure","doi":"10.1109/I-SMAC.2018.8653703","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653703","url":null,"abstract":"Security of web organizations is a stress in the present. Secure user check is essential and fundamental in numerous structures. Authentication and authentication systems typically use a pair of usernames and passwords, and only authenticate the user during the login session. No sessions were checked during a session that was canceled by a clear lock or expired after the user’s idle session. An emerging biometric solution replaces the user name and password of a user with biometric attributes and data during creation and session access. In this way, one-time verification is not enough, and user credentials are considered permanent throughout the session. The solution is to use a short session timeout period and ask users to enter their credentials periodically, but this is not a definitive solution and is a great punishment for service and satisfaction. User Satisfaction This article explores the interesting options offered by using biometric conferencing. Secure protocols for continuous monitoring are constantly monitored by users. Finally, the use of biometric data validation ensures that credentials are transparent without informing users or interacting with them in order to guarantee better service.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"297 1","pages":"536-541"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75000956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multimode authentication based Electronic voting Kiosk using Raspberry Pi 基于多模式认证的树莓派电子投票亭
Koomesh Pub Date : 2018-08-01 DOI: 10.1109/I-SMAC.2018.8653726
M. G. Gurubasavanna, Saleem Ulla Shariff, R. Mamatha, N. Sathisha
{"title":"Multimode authentication based Electronic voting Kiosk using Raspberry Pi","authors":"M. G. Gurubasavanna, Saleem Ulla Shariff, R. Mamatha, N. Sathisha","doi":"10.1109/I-SMAC.2018.8653726","DOIUrl":"https://doi.org/10.1109/I-SMAC.2018.8653726","url":null,"abstract":"India being the fastest developing country and the largest democracy in the world has replaced the trivial paper based ballot system with EVMs in the voting process. The technical advancement in the field of voting process by introduction of electronic voting machines or EVMs has changed the way how voting is done all over the world along with the raise of security concerns and issues like hacking or tampering of EVMs. The Proposed paper discusses about the steps to mitigate the security issues and how the turn out in voting can be increased by introducing the voter to have the facility to vote from any constituency even if he belongs to some other constituency from the designated authorized voting centers. The voting process can be made more secure by involving finger print or bio metric based authentication in the design along with face and iris recognition features. The paper discusses how raspberry pi can be utilized to build the prototype.","PeriodicalId":53631,"journal":{"name":"Koomesh","volume":"12 1","pages":"528-535"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76210235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信