355 research outputs found
Hybrid Swarm Intelligence Method for Post Clustering Content Based Image Retrieval
AbstractContent Based Image Retrieval is one of the most promising method for image retrieval where searching and retrieving images from large scale image database is a critical task. In Content Based Image Retrieval many visual feature like color, shape, and texture are extracted in order to match query image with stored database images. Matching the query image with each image of large scale database results in large number of disc scans which in turns slows down the systems performance.The proposed work suggested an approach for post clustering Content Based Image Retrieval, in which the database images are clustered into optimized clusters for further retrieval process. Various clustering algorithms are implemented and results are compared. Among all, it is found that hybrid ACPSO algorithm performs better over basic algorithms like k-means, ACO, PSO etc. Hybrid ACPSO has the capability to produce good cluster initialization and form global clustering.This paper discusses work-in-progress where we have implemented till clustering module and intermediate results are produced. These resulted clusters will further be used for effective Content Based Image Retrieval
An Empirical Estimation of CSS Cognitive Radio Network Performance under Spectrum Sensing Data Falsification Attack
Cooperative spectrum sensing (CSS) significantly improves the performance of spectrum sensing process in cognitive radio networks (CRNs). Individual spectrum sensing by a cognitive radio (CR) is often inaccurate as the channel often experiences fading and shadowing effects. CSS has been shown to have many advantages in terms of spectrum use and robustness. Despite these facts, a CSS scheme also vulnerable to many security attacks from Malicious users (MUs). In order to get unfair USAge of spectrum band, MUs can generate false spectrum sensing reports to disturb the good secondary users (SUs) decision about presence of primary user (PU). In this paper, we consider the spectrum sensing data falsification attack (SSDF) in CSS and propose the protocol to identify and eliminate the attacker or Malicious user (MU) to improve the network performance. In SSDF attack, MUs send the false spectrum sensing results to fusion center (FC) with the intension that it should make wrong decision about spectrum sensing. In this scenario, FC acts as a data collector to fuse the reports sent by SUs
Generalized Laplace-Fractional Mellin Transform and its Analytical structure
Fractional MellinTransform is integral part of mathematical modeling method because of its scale invariance property. Since its success in description of anomalous diffusion, non-integer calculus, both in one and multidimensional space, it has become an important tool in many areas of physics mechanics, chemistry finance and bioengineering. In this paper Generalization of Laplace-Fractional Mellin transform is presented. Analyticity theorem for the Laplace-Fractional Mellin Transform is also proved
Ayurveda View on Disease Progression w.s.r. to Concept of Shatkriyakala: A Review
Ayurveda aims to keep healthy people healthy and helps in the treatment of sick people's diseases. Ayurveda recommended a variety of treatments for balancing Dosha, Dhatu and Mala. Ayurveda portrayed various modalities of sickness determination and Kriyakala is one such methodology which assists or determines different phases of disease progression. The Kriyakala idea encourages specific treatment based on the stage of disease progression. The suitable measures can be taken to address the equilibriums of Doshas based on the specific phases of illness. Ayurveda looked into the idea of Shatkriyakala as a "six stages of disease progression" that can be used to evaluate the disease's pathogenesis in different stages. These six stages are Sanchaya, Prakopa, Prasara, Sthanasamshraya, Vyaktavastha and Bhedavastha. This article discussed six phases of Shatkriyakala, its significance in disease determination and their treatment
A Review on Enhancing Organization Security using Attribute-Based Encryption for Data Sharing
With the recent growth of networking, peoples can share their data with others through online, by using social networks or cloud computing but at the same time there has been increasing demand for data security. People would like to make their private data only accessible to the authorized people. In data sharing systems, access policies and the support of policies updates are most challenging issues. Attribute-based encryption (ABE) and Cipher text policy attribute based encryption (CP-ABE) are becoming promising cryptographic solutions to this issue and achives a fine-grained data access control. It enables data owners to define their own access policies over user attributes and enforce the policies on the data to be distributed. The major drawback of these systems is the key escrow problem. The proposed scheme solves the key escrow problem which depends on attribute based encryption technique for the shared data. Paillier Cryptosystem is utilized for encryption of keys for assignment and revocation process while Twofish algorithm is used to encrypt and decrypt stored data of users. Whenever data owner upload personal documents on cloud server, first the keywords will get fetched from the documents and index will be created. Lucene indexing algorithm is used for indexing of keywords. A Blind Storage scheme allows a client to store a set of files on a remote server
Recommended from our members
Study of Bajra Production in Solapur District, India: An Economic Perspective
This study examined the economics of Bajra production in Solapur district between 2021-22 using primary data. The study employed stratified and purposive random sampling data technics to select 90 bajra farmers through the use of well-structured questionnaire. The result shows that per hectare cost of cultivation of Bajra at cost “C3” was the highest in large group i.e. 40023.95 followed by medium group Rs. 31095.14 and small group Rs. 26086.85. To estimate cost and returns in Bajra production was achieved by tabular analysis with cost concepts i.e., Cost A1, Cost A2, Cost B1, Cost B2, Cost C1, Cost C2, & Cost C3 percentage and output-input ratio was emphasized. Study of constraints and suggestion of Bajra grower in production and marketing of Bajra was achieved by applying frequency and percentage method. The average yield and gross returns per hectare increased with the increase in size of farms. The Input Output ratio of Bajra at “C3” was 1.22 in small group, 1.24 in medium group and 1.26 in large group. This indicates that, Cultivation of Bajra crop was economically profitable. The average main production was 275.89 qt/ha
Handwriting Analysis on the Diaries of Rosamond Jacob
Handwriting is an art form that most people learn at an early age. Each
person's writing style is unique with small changes as we grow older and as our
mood changes. Here we analyse handwritten text in a culturally significant
personal diary. We compare changes in handwriting and relate this to the
sentiment of the written material and to the topic of diary entries. We
identify handwritten text from digitised images and generate a canonical form
for words using shape matching to compare how the same handwritten word appears
over a period of time. For determining the sentiment of diary entries, we use
the Hedonometer, a dictionary-based approach to scoring sentiment. We apply
these techniques to the historical diary entries of Rosamond Jacob (1888-1960),
an Irish writer and political activist whose daily diary entries report on the
major events in Ireland during the first half of the last century.Comment: International Conference on Content-based Multimedia Indexing,
September 20--22, 2023, Orleans, Franc
- …
