The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, face images are studied in the context of detection and recognition. In the literature, the problem of compressing human frontal facial images has been addressed. The images that are dealt are passport-type photos namely, full face, frontal view, plain background, no dark glasses, without hates and other non-standard clothing. Compression of Facial Images by using IDL is carried out...
Cloud computing and big data play important role in data communication and IT industry. Nowadays, all corporate companies use the huge amount of big data. Distributed File Systems need large amount of storage. This paper deals with the creation of single node and multinode clusters of Hadoop distributed file system. It is proved in this paper that it improves the performance of the system during multiple...
Feature selection is one of the important research areas in pattern recognition. The aim of feature selection is to select those of informative features to improve the classifier's performance. In this paper, we propose a novel multi-objective algorithm based on mutual information for feature selection, called multi-objective mutual information (MOMI). The proposed method identifies a set of features...
Modern technologies witness lot more developments. Cloud Computing (CC) is one of the rapid developments. The demands, the importance and the usage of CC is on the increase every day. As the importance is on the increase, so is the security problems and its threats. The problems in CC make huge impacts on the developments and its popularity. In CC, the data storage has become an indispensable dimensions...
Cloud Computing is a distributed and centralized network of inter connected and inter related systems with one or more IT resources provisioned based on pay-on-demand usage. Even though Cloud consumers or users are more flexible with cloud resources, there exist various issues which bring down the usage of cloud resources. Security issue is the major one among them. Data Security and Privacy, Identity...
Cloud Computing heads towards first among the top most developed technologies and with a better panorama in successive years by companies and organizations. This paper deeply analyses the Cloud Computing security hazards in layer wise such as Service layer (IaaS, SaaS, PaaS) network layer, storage layer and deployment models such as Public, Private and Hybrid cloud environments. In this analysis the...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Mobile computing works on the principle of broadcasting so that the information is radiated to everyone within the wave range which increases security threats and cyber attacks replicated quickly and easily. Thus, care must be taken in handling those types of attacks to provide information security while the user roams through different networks with heterogeneous security infrastructure. For that...
Automatic signature recognition is most active area of research with number of applications such as financial, official work, bank cheque, business etc. To obtain maximum possible security from fake signature there is emergent need for a signature recognition, which can assure good results and gives better performance than already established offline signature recognition methods. In this paper, we...
Handwritten character recognition of the Marathi language is a challenging task because characters are complex in structure. 31320 samples of characters from different writers have been collected and database is prepared. Noise is removed by using morphological and thresholding operation. Skewed scanned pages and segmented characters are corrected using Hough Transformation. The characters are segmented...
The macula is the part of the eye that helps to provide us with our central vision. Diabetic Maculopathy is when the macula sustains some form of dames. DM is a blurring of one central vision. In this paper we have proposed algorithm for macula on retinal images by using fuzzy c-means (FCM) algorithm. The pre-processing stages of macula detection including image resizing, noise removal is performed...
Diabetes is a complex disease then increasing in prevalence around the world. Type 2 diabetes mellitus (T2DM accounts for about 80-90% of all diagnosed adult cases of diabetes. Most present diagnostic methods for T2DM are black-box models, which are unable to provide the reasons underlying diagnosis to physicians therefore, algorithms that can provide further insight are needed. Rule extraction can...
The measure of information delivered inside Health Informatics has become entirely tremendous, what's more, investigation of this Big Data allows conceivably boundless potential outcomes for learning to be picked up. Moreover, this data can enhance the nature of social insurance offered to patients. Notwithstanding, there are various issues that emerge when managing these unfathomable amounts of information,...
Solving combinatorial optimization problems has been a great research challenge which could not be effectively addressed by the exact or heuristic methods. This has lead to the application of meta-heuristic or hybrid meta-heuristic approaches in the recent past. These hybrid meta-heuristic approaches are said to be superior in giving an optimal or at least sub-optimal results within a specific time...
In the modern era of computing, secure data sharing has become one of the challenges when considering the adoption of multi-cloud storage services. It has become one of the essential services in cloud computing. Many advantages of multi-cloud storage attracts the individuals and organization to move their data from remote to cloud servers. Recently many Multi-cloud storage services have been proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.