- International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR), Software Engineering, Educational Technology, Data Mining, Management, Artificial Intelligence, and 5 moreBusiness, International Relations, Computer Science, Information Systems, and Engineeringedit
Research Interests:
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Research Interests: Computer Science, Database Systems, Information Visualization, Databases, Data Visualization, and 15 moreHadoop, Data Science, Big Data, Hamas, Big Data Analytics, Hama, Apache Hadoop, MapReduce and Hadoop, Big Data Technologies, Big Data Applications, Bigdata Hadoop, Converse, Jobtracker, avro, and data domains
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges t...
Research Interests: Computer Science, Information Technology, Computer Science Education, Computer Engineering, Computer Security, and 15 moreInternet of Things, The Internet, Hacker, Information and Technology, Engineering and Computer Science, Computer Science Engineering, Sybil Attack Detection, Sybil Attacks, Computer Science and Engineering, Software Deployment, Computer Science Information Technology, IoT Security, IoT Authentication, IoT Protocols, and IoT Trust
Research Interests:
Research Interests: Computer Science, Computer Vision, Watermarking, Digital Data Hiding, Encryption, and 14 moreDigital Watermarking, Steganography, Computer Software, Data Hiding, Communication and media Studies, Digital Image, Copyright Protection, Least Significant Bit, Watermark, Normalized Cross Correlation, Peak Signal to Noise Ratio (PSNR), Pixel, Normalized Cross Correlation (NC), and arXiv
Research Interests:
Research Interests:
Research Interests: Computer Science, Artificial Intelligence, Image Features Extraction, Neural Networks, Artificial Neural Networks, and 13 moreDeep Learning, Segmentation, Feature Extraction, Vector Quantization, EXTRACTION, Computer Applications, LICENSE, Automatic vehicle license plate recognition, Artificial Neural Network, Learning Vector Quantization, Vehicle license plate locating, Arabic Character Segmentation, and Vehicle License Plate
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information... more
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information transmitted via wireless networks that puts out different kinds of unauthorized actions of breakers. Solution of this problem is applying cryptography in wireless networks. We proposed 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and h...
In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and... more
In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. The proposed Saudi Arabia Vehicle License plate recognition system splits into three major parts, firstly extraction of a license plate region secondly segmentation of the plate characters and lastly recognition of each character. This act is quite challenging due to the multiformity of plate formats and the nonuniform outdoor illumination conditions during image collection. In this paper recognition of the license plates is achieved by the implementation of the Learning Vector Quantization artificial neural network. Their results are based upon their completeness in the Saudi Arabia Vehicle License plate character recognition and theirs have obtained encouraging results from proposed technique.
Research Interests:
Handwriting is one of the most important means of daily communication. Although the problem of handwriting recognition has been considered for more than 60 years there are still many open issues, especially in the task of unconstrained... more
Handwriting is one of the most important means of daily communication. Although the problem of handwriting recognition has been considered for more than 60 years there are still many open issues, especially in the task of unconstrained handwritten sentence recognition. This paper focuses on the automatic system that recognizes continuous English sentence through a mouse-based gestures in real-time based on Artificial Neural Network. The proposed Artificial Neural Network is trained using the traditional backpropagation algorithm for self supervised neural network which provides the system with great learning ability and thus has proven highly successful in training for feed-forward Artificial Neural Network. The designed algorithm is not only capable of translating discrete gesture moves, but also continuous gestures through the mouse. In this paper we are using the efficient neural network approach for recognizing English sentence drawn by mouse. This approach shows an efficient wa...
Research Interests:
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Handwriting recognition is a challenging task for many real-world applications such as document authentication, form processing, historical documents. This paper focuses on the comparative study on off-line handwriting recognition system... more
Handwriting recognition is a challenging task for many real-world applications such as document authentication, form processing, historical documents. This paper focuses on the comparative study on off-line handwriting recognition system and Printed Characters by taking Arabic handwriting. The off-line Handwriting Recognition methods for Arabic words which being often used among then across the Middle East and North Africa people. In this paper we are proposing off-line Arabic handwriting and printed characters and the language used by the majority of the Middle East. We are using discrete Hidden Markov Models (HMM) for Arabic handwriting and printed characters for the final recognition. In this paper after preprocessing step the characters are auto-segmented using a recursive algorithm as sequences of connected neighbors along lines and curves and Arabic words are first pre-classified into one of known character groups, based on the structural properties of the text line. The propo...
— Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
— Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and no...
Research Interests:
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and norm...
Research Interests:
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Research Interests: Computer Science, Visualization, Database Systems, Information Visualization, Databases, and 15 moreData Visualization, Hadoop, Big Data, Hamas, Big Data Analytics, Hama, Apache Hadoop, MapReduce and Hadoop, Storage Infrastructure, Big Data Technologies, Big Data Applications, Bigdata Hadoop, Jobtracker, avro, and data domains
The countenance recognition presents a challenging problem in the field of image analysis and computer vision. Also, it received a good attention over the last few years. The applications of countenance recognition in the areas such as... more
The countenance recognition presents a challenging problem in the field of image analysis and computer vision. Also, it received a good attention over the last few years. The applications of countenance recognition in the areas such as person tracking, surveillance, protection, entertainment, theft prevention, as easily as in the growth of human machine interfaces. It has been shown that precision in countenance is crucial to countenance recognition algorithms. An error of a few pixels in countenance will produce an important reduction in countenance recognition rates. In this paper, two approaches are proposed for use in countenance recognition of human. Firstly, Bacterial Foraging Optimization (BFO) and secondly, Particle Swarm Optimization (PSO). The Bacterial Foraging Optimization in which the features extracted from Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA) are optimized. The Particle Swarm Optimization (PSO), which optimizes the transform coef...
Research Interests:
The data mining techniques have the ability to discover hidden patterns or correlation among the objects in the medical data. There are many areas that adapt data mining techniques, namely marketing, stock, health care sector and so on.... more
The data mining techniques have the ability to discover hidden patterns or correlation among the objects in the medical data. There are many areas that adapt data mining techniques, namely marketing, stock, health care sector and so on. In the health care industry produces gigantic quantities of data that clutches complex information relating to the sick person and their medical conditions. The data mining has an infinite potential to make use of healthcare data more effectually and efficiently to predict various kinds of disease. The present-time healthcare industry heart ailment is a term that assigns to an enormous number of health care circumstances related to heart. These medical circumstances relate to the unexpected health circumstance that straight control the cardiac. In this paper we are using a ROCK algorithm because it uses Jaccard coefficient on the contrary using the distance measures to find the similarity between the data or documents to classify the clusters and th...
Research Interests:
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and normalization. To combine the Arabic script output sequences of the recognizers, we incrementally align the word sequences using a norm string matching algorithm. The Arabic script combination we could increase the system performance over the excellent character recognizer by about 3%. The proposed technique is also the necessary step towards character recognition, person identification, personality determination where input data is processed from all perspectives.
Digital waterm arking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this... more
Digital waterm arking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Copyright protection of images has become a major concern with the rapid expansion of the Internet, which contains millions of freely available images. Digital watermarking is one of the proposed solutions for copyright protection of multimedia and is becoming a m ajor player not only for use in images but also in the latest technology such as audio, im age and video. In this paper robustness of digital image watermarking algorithm based on transforming domain. We are proposing a robust combined Discrete Laguerre Transform (DLT) and Discrete Wavelet Transform (DWT) watermark transformation algorithm. Experimental results show that the higher robustness against common ...
Research Interests:
The subject "quality" is nowadays, in a globalized world, one of the key concerns of businessmen to face the competition on industries and service areas. Financial groups are measuring no efforts to achieve quality excellence,... more
The subject "quality" is nowadays, in a globalized world, one of the key concerns of businessmen to face the competition on industries and service areas. Financial groups are measuring no efforts to achieve quality excellence, starting by customer services and relationship. Indian banking sector opened its doors to private and international players after the economic liberalization in the year 1991. It has been almost 2 decades of operation of the private banks in India. Much has evolved in the overall structure of banking during this time but have the private banks delivered the type of quality that the customers expect them to. This research is an effort to evaluate the service quality of the private banks in India. The study is based on primary data collected in the cities of Delhi and NCR through a structured questionnaire designed on the basis of SERVQUAL Model. The banks under study are the five top private banks from Delhi and NCR region. The study has found that no...
Research Interests:
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s' Internet wave connected 1.2 billion subscribers while the 2000s' mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many chal...