International Journal of Trend in Scientific Research and Development, Aug 31, 2018
Automation is rapidly growing in the present technology. So automation plays a vital role in the ... more Automation is rapidly growing in the present technology. So automation plays a vital role in the agricultural field which is helpful for the farmers. In the earlier days, the grass cutters used were manually handheld devices. Because of this, there was pollution and loss of energy as they used gas and petrol engines. So the old grass cutters need to be replaced by automated ones, where the system will work for guidance and obstacle detection using battery as a power source. And it used Arduino UNO microcontroller board as the main controller of the system, Ultrasonic sensor for object NODE MCU for Wi-Fi connection, a linear blade for cutting the grass, and a motor drive for the wheels of the Robot. This is fully automated and renewable energy based project.
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Dec 1, 2017
The human behavior recognition is a significant task of discovery and identification of behaviors... more The human behavior recognition is a significant task of discovery and identification of behaviors through an input hand written image and changing that information to the corresponding machine in an editable form. This work is classified into two phases known as testing and training. In this work the hand written image is selected as input image containing a word with cursive O. In the pre-processing step of the testing phase, the image is resized, and the color conversion is also applied. The interested region is also for segmenting the middle loop cursive. The segmented middle loop is then passed to the Freeman Chain Code, and the zoning feature is extracting systems and then extracts the feature. Later in training part, the preceding trained samples of hand written images are then stored in the knowledge base. The hand writing style of cursive O is identified, and thus it defines the behavior of a person. The feature extracted system results are then compared with the SVM trained results stored in knowledge based using SVM Classifier.
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual's behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
The current personal identification strategy does not provide high amount of privacy to the indiv... more The current personal identification strategy does not provide high amount of privacy to the individual databases and is not convenient and also very time consuming. In my work, I have improved the privacy of an individual to higher level. In the structure, three sorts of organizing scores, which are exclusively procured by the left-hand PALM_PRINT planning, right PALM_PRINT plans and intersection organizing between the left request and right get ready PALM_PRINT, are interlaced to settle on an official decision. Palm prints of both hand of a person are to some degree connected and it enhances the exactness of character distinguishing proof.
Handwriting is actually brain writing. The subconscious mind comes into play, which reveals the t... more Handwriting is actually brain writing. The subconscious mind comes into play, which reveals the traits .A systematic approach is proposed towards understanding the Human behaviors through handwriting. The feature vector is built by considering the distance between words, orientation and alignment of the words right or left. The data set was developed using 200 samples from people belonging to different works of life. This system developed is mood invariant since the samples were collected by different people at different point of time and unconstrained hand writing analysis. The handwriting of 100 adults was submitted for graphological analysis. The graphologist's answers to questions on the person's personality, her description of his character and her assessment of his inclination towards past ,present and current were checked by the person's own answers to the questionnaire, by the personality descriptions in the case-sheets, and by the results of the Progressive Matr...
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual’s behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
Identification of Personality is a complex process. Personality traits are stable over time .Indi... more Identification of Personality is a complex process. Personality traits are stable over time .Individual's behavior naturally varies from occasion to occasion. But there is a core consistency which defines the true nature. The paper addresses this issue of behavior. Graphology is normally a technique used to identify the traits. Accuracy of this technique depends on how skilled the analyst is. Although human intervention in handwriting analysis has been effective, but it is costly and prone to fatigue. An automation of handwritten text is proposed. Basically we have considered three important features in the direction of orientation of the lines :(i) up hill (ii) down hill (iii) constant line. Edge histogram and bounding boxes was used for feature extraction .Known classifiers like SVM & ANN are used for training and the results were compared. The results were about 98% for SVM & 70% with ANN. The analysis was done using single line.
Abstract—Reversible data hiding with image encryption (RDH), since it maintains the excellent pro... more Abstract—Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
A virtual host computer system that enables enterprises to buy, lease, sell, or distribute softwa... more A virtual host computer system that enables enterprises to buy, lease, sell, or distribute software and other digital resources over the internet as an on-demand service is cloud computing. Though the new paradigm of cloud computing provides great advantages, there are meanwhile also concerns about security and privacy for web based cloud services. A multi-factor authentication and access control system for web-based cloud computing services is developed. In the proposed authenticated access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a trusted security key response. The login of the user is secured by one time key password system (OTP) and each login is secured with session keys i.e. The user is allowed to work only for a permitted time period. A user cannot access the system if she /he does not hold all the three factors: the OTP, secret key, secret key response, the mechanism enhances the security of th...
Property predicated Encryption (ABE) is viewed as a promising cryptographic leading execute to gu... more Property predicated Encryption (ABE) is viewed as a promising cryptographic leading execute to guarantee information proprietors' immediate control over their information in broad daylight distributed storage. The prior ABE plans include just a single domination to keep up the entire property set, which can bring a solitary point bottleneck on both security and execution. Consequently, some multi-domination plans are proposed; in which various ascendant elements discretely keep up disjoint quality subsets. Nonetheless, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we lead a limit multi-power CP-ABE get to control conspire for open distributed storage, assigned TMACS, in which numerous ascendant substances together deal with a uniform quality set. In TMACS, profiting by (t; n) { t - any one Ascendancy, n - no of Ascendant entities} limit mystery sharing, the ace key can be shared among different ascendant elements, and a licit utiliz...
A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaul... more A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaults), since intrusion detection is essential however shockingly deficient. So we have to design and implement a powerful detection and reaction techniques to bypass intrusions when they are detected. This intrusion and detection strategy is in view of distinctive sorts of counter-measures. The principle thought is to design and develop a decision support tool to help the administrator to pick the suitable counter-measure when an intrusion is detected. Cloud computing is another developing strategy in computer oriented services. This framework have some distributed system, as per these likenesses of cloud computing additionally utilizes the components of virtual networking environment. And it provides the Data recovery of the Cloud Server when attacker attacks the Cloud; here it uses the basic data recovery algorithm by taking the backup of
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual's behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017
The human behavior recognition is a significant task of discovery and identification of behaviors... more The human behavior recognition is a significant task of discovery and identification of behaviors through an input hand written image and changing that information to the corresponding machine in an editable form. This work is classified into two phases known as testing and training. In this work the hand written image is selected as input image containing a word with cursive O. In the pre-processing step of the testing phase, the image is resized, and the color conversion is also applied. The interested region is also for segmenting the middle loop cursive. The segmented middle loop is then passed to the Freeman Chain Code, and the zoning feature is extracting systems and then extracts the feature. Later in training part, the preceding trained samples of hand written images are then stored in the knowledge base. The hand writing style of cursive O is identified, and thus it defines the behavior of a person. The feature extracted system results are then compared with the SVM trained...
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual’s behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
International Journal of Trend in Scientific Research and Development
Automation is rapidly growing in the present technology. So automation plays a vital role in the ... more Automation is rapidly growing in the present technology. So automation plays a vital role in the agricultural field which is helpful for the farmers. In the earlier days, the grass cutters used were manually handheld devices. Because of this, there was pollution and loss of energy as they used gas and petrol engines. So the old grass cutters need to be replaced by automated ones, where the system will work for guidance and obstacle detection using battery as a power source. And it used Arduino UNO microcontroller board as the main controller of the system, Ultrasonic sensor for object NODE MCU for Wi-Fi connection, a linear blade for cutting the grass, and a motor drive for the wheels of the Robot. This is fully automated and renewable energy based project.
International Journal of Trend in Scientific Research and Development, Aug 31, 2018
Automation is rapidly growing in the present technology. So automation plays a vital role in the ... more Automation is rapidly growing in the present technology. So automation plays a vital role in the agricultural field which is helpful for the farmers. In the earlier days, the grass cutters used were manually handheld devices. Because of this, there was pollution and loss of energy as they used gas and petrol engines. So the old grass cutters need to be replaced by automated ones, where the system will work for guidance and obstacle detection using battery as a power source. And it used Arduino UNO microcontroller board as the main controller of the system, Ultrasonic sensor for object NODE MCU for Wi-Fi connection, a linear blade for cutting the grass, and a motor drive for the wheels of the Robot. This is fully automated and renewable energy based project.
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), Dec 1, 2017
The human behavior recognition is a significant task of discovery and identification of behaviors... more The human behavior recognition is a significant task of discovery and identification of behaviors through an input hand written image and changing that information to the corresponding machine in an editable form. This work is classified into two phases known as testing and training. In this work the hand written image is selected as input image containing a word with cursive O. In the pre-processing step of the testing phase, the image is resized, and the color conversion is also applied. The interested region is also for segmenting the middle loop cursive. The segmented middle loop is then passed to the Freeman Chain Code, and the zoning feature is extracting systems and then extracts the feature. Later in training part, the preceding trained samples of hand written images are then stored in the knowledge base. The hand writing style of cursive O is identified, and thus it defines the behavior of a person. The feature extracted system results are then compared with the SVM trained results stored in knowledge based using SVM Classifier.
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual's behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
The current personal identification strategy does not provide high amount of privacy to the indiv... more The current personal identification strategy does not provide high amount of privacy to the individual databases and is not convenient and also very time consuming. In my work, I have improved the privacy of an individual to higher level. In the structure, three sorts of organizing scores, which are exclusively procured by the left-hand PALM_PRINT planning, right PALM_PRINT plans and intersection organizing between the left request and right get ready PALM_PRINT, are interlaced to settle on an official decision. Palm prints of both hand of a person are to some degree connected and it enhances the exactness of character distinguishing proof.
Handwriting is actually brain writing. The subconscious mind comes into play, which reveals the t... more Handwriting is actually brain writing. The subconscious mind comes into play, which reveals the traits .A systematic approach is proposed towards understanding the Human behaviors through handwriting. The feature vector is built by considering the distance between words, orientation and alignment of the words right or left. The data set was developed using 200 samples from people belonging to different works of life. This system developed is mood invariant since the samples were collected by different people at different point of time and unconstrained hand writing analysis. The handwriting of 100 adults was submitted for graphological analysis. The graphologist's answers to questions on the person's personality, her description of his character and her assessment of his inclination towards past ,present and current were checked by the person's own answers to the questionnaire, by the personality descriptions in the case-sheets, and by the results of the Progressive Matr...
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual’s behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
Identification of Personality is a complex process. Personality traits are stable over time .Indi... more Identification of Personality is a complex process. Personality traits are stable over time .Individual's behavior naturally varies from occasion to occasion. But there is a core consistency which defines the true nature. The paper addresses this issue of behavior. Graphology is normally a technique used to identify the traits. Accuracy of this technique depends on how skilled the analyst is. Although human intervention in handwriting analysis has been effective, but it is costly and prone to fatigue. An automation of handwritten text is proposed. Basically we have considered three important features in the direction of orientation of the lines :(i) up hill (ii) down hill (iii) constant line. Edge histogram and bounding boxes was used for feature extraction .Known classifiers like SVM & ANN are used for training and the results were compared. The results were about 98% for SVM & 70% with ANN. The analysis was done using single line.
Abstract—Reversible data hiding with image encryption (RDH), since it maintains the excellent pro... more Abstract—Reversible data hiding with image encryption (RDH), since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content’s confidentiality. In previous work vacating room after encrypted image, which subject to some errors on data extraction and/or image restoration. In this paper, a novel method by reserving room before encryption with a traditional RDH algorithm, and thus it is easy for the data hider to reversibly embed data in the encrypted image. The proposed method can achieve real reversibility, that is, data extraction and image recovery are free of any error.
A virtual host computer system that enables enterprises to buy, lease, sell, or distribute softwa... more A virtual host computer system that enables enterprises to buy, lease, sell, or distribute software and other digital resources over the internet as an on-demand service is cloud computing. Though the new paradigm of cloud computing provides great advantages, there are meanwhile also concerns about security and privacy for web based cloud services. A multi-factor authentication and access control system for web-based cloud computing services is developed. In the proposed authenticated access control system, an attribute-based access control mechanism is implemented with the necessity of both user secret key and a trusted security key response. The login of the user is secured by one time key password system (OTP) and each login is secured with session keys i.e. The user is allowed to work only for a permitted time period. A user cannot access the system if she /he does not hold all the three factors: the OTP, secret key, secret key response, the mechanism enhances the security of th...
Property predicated Encryption (ABE) is viewed as a promising cryptographic leading execute to gu... more Property predicated Encryption (ABE) is viewed as a promising cryptographic leading execute to guarantee information proprietors' immediate control over their information in broad daylight distributed storage. The prior ABE plans include just a single domination to keep up the entire property set, which can bring a solitary point bottleneck on both security and execution. Consequently, some multi-domination plans are proposed; in which various ascendant elements discretely keep up disjoint quality subsets. Nonetheless, the single-point bottleneck issue stays unsolved. In this paper, from another point of view, we lead a limit multi-power CP-ABE get to control conspire for open distributed storage, assigned TMACS, in which numerous ascendant substances together deal with a uniform quality set. In TMACS, profiting by (t; n) { t - any one Ascendancy, n - no of Ascendant entities} limit mystery sharing, the ace key can be shared among different ascendant elements, and a licit utiliz...
A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaul... more A considerable lot of the computer infrastructure are progressively vulnerable to attacks (assaults), since intrusion detection is essential however shockingly deficient. So we have to design and implement a powerful detection and reaction techniques to bypass intrusions when they are detected. This intrusion and detection strategy is in view of distinctive sorts of counter-measures. The principle thought is to design and develop a decision support tool to help the administrator to pick the suitable counter-measure when an intrusion is detected. Cloud computing is another developing strategy in computer oriented services. This framework have some distributed system, as per these likenesses of cloud computing additionally utilizes the components of virtual networking environment. And it provides the Data recovery of the Cloud Server when attacker attacks the Cloud; here it uses the basic data recovery algorithm by taking the backup of
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual's behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
2017 International Conference on Electrical, Electronics, Communication, Computer, and Optimization Techniques (ICEECCOT), 2017
The human behavior recognition is a significant task of discovery and identification of behaviors... more The human behavior recognition is a significant task of discovery and identification of behaviors through an input hand written image and changing that information to the corresponding machine in an editable form. This work is classified into two phases known as testing and training. In this work the hand written image is selected as input image containing a word with cursive O. In the pre-processing step of the testing phase, the image is resized, and the color conversion is also applied. The interested region is also for segmenting the middle loop cursive. The segmented middle loop is then passed to the Freeman Chain Code, and the zoning feature is extracting systems and then extracts the feature. Later in training part, the preceding trained samples of hand written images are then stored in the knowledge base. The hand writing style of cursive O is identified, and thus it defines the behavior of a person. The feature extracted system results are then compared with the SVM trained...
Personality trait identification is of paramount importance. Personality Traits are stable over t... more Personality trait identification is of paramount importance. Personality Traits are stable over time. Individual’s behavior naturally varies somewhat from occasion to occasion but there is a core of consistency which defines the true nature. Traits directly influence behavior. There are several methods for identifying traits. We provide an overview of this body of literature drawing out ample avenue for trait identification through hand writing and Psychometric analysis. Handwriting reveals the true personality including emotional outlay, fears, honesty, defenses and many others. A big five factor model is considered to find out individual differences.
International Journal of Trend in Scientific Research and Development
Automation is rapidly growing in the present technology. So automation plays a vital role in the ... more Automation is rapidly growing in the present technology. So automation plays a vital role in the agricultural field which is helpful for the farmers. In the earlier days, the grass cutters used were manually handheld devices. Because of this, there was pollution and loss of energy as they used gas and petrol engines. So the old grass cutters need to be replaced by automated ones, where the system will work for guidance and obstacle detection using battery as a power source. And it used Arduino UNO microcontroller board as the main controller of the system, Ultrasonic sensor for object NODE MCU for Wi-Fi connection, a linear blade for cutting the grass, and a motor drive for the wheels of the Robot. This is fully automated and renewable energy based project.
Uploads
Papers by syeda asra