{"title":"Geospatial Analysis of Urban Sprawl Patterns in Amritsar City, Punjab, India","authors":"M. Minakshi, Shivani Singh, B. Pateriya","doi":"10.5120/IJAIS2017451636","DOIUrl":"https://doi.org/10.5120/IJAIS2017451636","url":null,"abstract":"Amritsar is the largest and most important city in northern Punjab. Amritsar serves as a major commercial, cultural, and transportation hub with Golden Temple & Raja Sansi international airport. It lies about 25 km east of the border with Pakistan and gateway for travelers coming to India on the overland route from central Asia. The present study attempts to understand, detect and quantify the spatial pattern of Amritsar urban sprawl using Shannon’s entropy and multitemporal satellite images acquired for the period from 1972 to 2015. Shannon’s entropy has been used to model the city’s urban sprawl, trend and spatial change. The entropy values for the different grids were modeled and the interpolation function in ArcGIS is used to obtain an entropy surface for each acquired temporal image. The entropy surface index indicates the spatial pattern of the urban sprawl and facilitates to visual assess the entropy phenomenon in all the grids. The value of Shannon’s entropy index increased from (0.40) in year 1972 to (0.97) in year 2015, indicating more dispersed urban growth, an indication of urban sprawl. Results obtained from entropy indices help in understanding the sprawl patterns and dynamics among different grids and provide a visual comparison which facilitates the decision makers and city planners for measuring the urban sprawl required for mega cities.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"306 1","pages":"8-14"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73469593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin
{"title":"Performance Analysis of Image Restoration Techniques for Dermoscopy Images","authors":"M. A. Altuncu, F. K. Gülagiz, Fatma Selin Hangisi, S. Sahin","doi":"10.5120/IJAIS2017451637","DOIUrl":"https://doi.org/10.5120/IJAIS2017451637","url":null,"abstract":"Image enhancement and image restoration methods are widely used in most of the recent image processing studies. The main purpose of image enhancement is to remove noise from the image albeit different kinds. Therefore, in every field where image processing methods are used, image enhancement methods are more or less needed. And dermatological images, in which mostly image quality is inadequate most of the time, are one of the primary fields where these techniques are needed. Dermatologists that work in this field carry out the recording of wound images via a digital dermoscopy device. Later they realize the decision-making process using the image processing techniques through software. And in this study, the comparison of different image preprocessing methods is carried out in order to remove the effects of lighting and to make the software used give more accurate decisions.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"7 1","pages":"15-19"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82092218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Study of Facial Action Coding","authors":"A. Alomari","doi":"10.5120/IJAIS2017451643","DOIUrl":"https://doi.org/10.5120/IJAIS2017451643","url":null,"abstract":"Facial Action Coding (FAC) is expected to apply the whole world. The solicitations are not controlled to media communications. FAC is a testing difficulty in computer vision and remains alarm security case, and a novel strategy for program FAC is guided to bargain nearby the issue. The principle trial here, head-case and non-unbending outward appearance conformities because of alterations invited by the brutal face decoupling to present as they are coupled to the non-direct pictures. One more trial is the way to proficiently request to empower affiliation to contemplate expression (or different facial components) is to misuse the data. Facial Expression(FE) picture succession is fleeting territory spatial region information directly rise, however moreover the advance is not known. Information considering the increase of appearance together nearby the photo participation information can more improve the presentation of acknowledgment. However, the active information supplied is practical, there how to capture this information dependably and powerfully concerning facing challenges. For instance, an FE arrangement typically, one or additional of the principle times of development and counterbalance beat. Temporary information and preparing with a specific end goal to capture and question transient groupings of identical information, to make the correspondence in the midst of different worldly periods request to be built up. Press can be encoded. In this work, another dynamic FE, hereditary and neural organize based way utilizing the half, and half method are made.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"41 1","pages":"18-21"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87503473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal
{"title":"An Overview on User Profiling in Online Social Networks","authors":"Dr. Vasanthakumar G. U., K. Sunithamma, P. D. Shenoy, K. Venugopal","doi":"10.5120/IJAIS2017451639","DOIUrl":"https://doi.org/10.5120/IJAIS2017451639","url":null,"abstract":"Advances in Online Social Networks is creating huge data day in and out providing lot of opportunities to its users to express their interest and opinion. Due to the popularity and exposure of social networks, many intruders are using this platform for illegal purposes. Identifying such users is challenging and requires digging huge knowledge out of the data being flown in the social media. This work gives an insight to profile users in online social networks. User Profiles are established based on the behavioral patterns, correlations and activities of the user analyzed from the aggregated data using techniques like clustering, behavioral analysis, content analysis and face detection. Depending on application and purpose, the mechanism used in profiling users varies. Further study on other mechanisms used in profiling users is under the scope of future endeavors.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"23 1","pages":"25-42"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84951439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Automatic Brain Tumor Detection and Segmentation using Hybrid Method","authors":"S. Sreedhanya, C. Pawar","doi":"10.5120/IJAIS2017451641","DOIUrl":"https://doi.org/10.5120/IJAIS2017451641","url":null,"abstract":"","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"91 1","pages":"6-11"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77506502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das
{"title":"A Proposal on Cloud based Data Centre using Shared Memory of Mobile Storage by Virtualization","authors":"N. Sakib, Raihan Ahmed, Tanvir Ahmed, F. Islam, Bijoy Das","doi":"10.5120/IJAIS2017451635","DOIUrl":"https://doi.org/10.5120/IJAIS2017451635","url":null,"abstract":"Cloud computing is a broadly used technology which serves users with resources on specific demand enhancing manageability, minimizing the data management and operational cost. Basically, cloud allows users to store their valuable data on the cloud storage so the security of the data center and easy access are considered as focusable parts in cloud computing. In the study we spot light to a new approach of cloud computing where mobile storage is used to build the data center of cloud and easy access having a preferable security. We deliberate that it is possible to lower the cost if the data center is built using user's mobile storage so a 3-tier technology is proposed. Firstly, a layer is user's mobile devices, second layer is server with different virtual machines and last layer is again the user's mobile device which is used to build the data center of cloud (mobile-server-mobile). A mobile app implements the initial security and management issues. Users can oscillate data between first layer and third layer with the help of virtual machines that ensure secure transaction of data, reduction of power consumption, maintenance cost, bandwidth consumption and fast data sharing.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"21 1","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81953650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Weekly Mining of Fuzzy Patterns from Temporal Datasets","authors":"Husamuddin","doi":"10.5120/IJAIS2017451638","DOIUrl":"https://doi.org/10.5120/IJAIS2017451638","url":null,"abstract":"The process of extracting fuzzy patterns from temporal datasets is a well known data mining problem. Weekly pattern is one such example where it reflects a pattern with some fuzzy time interval every week. This process involves two steps. Firstly, it finds frequent sets and secondly, it finds the association rules that occur in certain time intervals weekly. Most of the fuzzy patterns are concentrated as user defined. However, the probability of user not having prior knowledge of datasets being used in some applications is more. Thus, resulting in the loss of fuzziness related to the problem. The limitation of the natural language also bounds the user in specifying the same. This paper, proposes a method of extracting patterns that occur weekly in a particular fuzzy time frame and the fuzzy time frame is generated by the method itself. The efficacy of the method is backed by the experimental results","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"15 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2017-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84016477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using cloud computing in higher education: a strategy to address trust issues in adoption of cloud services in Kenyan Public and Private Universities","authors":"D. Onyango","doi":"10.5120/IJAIS2016451630","DOIUrl":"https://doi.org/10.5120/IJAIS2016451630","url":null,"abstract":"Cloud computing is fast gaining significant ground as a solution to offer institutions with competitive advantage compared to the old traditional IT. Nevertheless, many institutions are still clenched to the traditional IT where legacy IT systems or applications are hosted in-house and hence administration of the systems or services is local or on premise. This has resulted in high IT expenditures on both hardware and software due to increased storage demands as well as investing on high skilled resources to administer the existing systems or applications which might not be viable in the long run. Despite the potential benefits that is associated with cloud computing which includes reduction of total costs of acquisition or ownership (TCO) of hardware, software and skilled resources, adoption level of cloud services is still very low in higher institutions of learning due to matters security especially trust issue which remains a major concern over cloud solutions. A case study was carried out in selected public and private universities to determine the reason for the low cloud uptake by the key stakeholders in higher institution of learning. An adoption strategy was recommended with reference to the resources, confidentiality, integrity and availability. The focus was on how key stakeholders view cloud services in the context of unique operational efficiency. General Terms Cloud Computing, Trust, Higher Education","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"37 1","pages":"46-53"},"PeriodicalIF":0.0,"publicationDate":"2016-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88823149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"In what way Interactions Amongst Social Entities can be Integrated into Computations as Basis for Unravelling Complications","authors":"Khalid A. Fakeeh","doi":"10.5120/ijais2016451627","DOIUrl":"https://doi.org/10.5120/ijais2016451627","url":null,"abstract":"A social network is a network of relationships and interactions among social entities such as individuals, organizations, and groups. Social simulations are capable of representing social systems and coupled socio-techno-natural systems in ways that other methodological approaches are not. Computer code in a well-chosen programming language or simulation system. The pivotal role that agent interaction plays in determining social patterns has been investigated by two leading sociologists, James S. Coleman and Raymond Bourdon. In the 1960s, Coleman significantly contributed to developing mathematical sociology, but also worked to extend equationbased models through computer simulation could motivate and agent-based turn in sociology. This approach would contribute to shifting away from social systems tradition and their large-scale problems of social speculation to problems which can be studied by systematic research. The purpose of this paper is to discuss the challenges facing social entities, and how social objects can be incorporated into computations as the basis for solving difficulties.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"10 1","pages":"22-24"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76017507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Overview of DDOS Attacks Detection and Prevention in the Cloud","authors":"Khalid A. Fakeeh","doi":"10.5120/IJAIS2016451628","DOIUrl":"https://doi.org/10.5120/IJAIS2016451628","url":null,"abstract":"Security is an illusion unless you are hacked. Attacks in the Cloud have more catastrophic and destructive impact on the organizations than the user might expect. As attacks are constantly evolving and making it difficult to defend. Most of the organization will try to check their devices in the cloud to protect against viruses with traditional security measures like antiviruses, or firewall thinking it secures across different attacks, but with a wide range of change in attack pattern organizations have exposed to significant operational and business consequences, not to mention public embarrassment. In this paper, we conducted the survey on DDOS (Distributed Denial of Service) attacks research work and analyzed prevention and detection methods used for DDOS attacks in the cloud. We found that there is a good amount of research scope in detecting and preventing slow client application layer attacks in the cloud.","PeriodicalId":92376,"journal":{"name":"International journal of applied information systems","volume":"30 1","pages":"25-34"},"PeriodicalIF":0.0,"publicationDate":"2016-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83349663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}