Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s’ Internet wave connected 1.2 billion subscribers while the 2000s’ mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many challenges t...
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information... more
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information transmitted via wireless networks that puts out different kinds of unauthorized actions of breakers. Solution of this problem is applying cryptography in wireless networks. We proposed 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and h...
In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and... more
In the today scenario technological intelligence is a higher demand after commodity even in traffic-based systems. These intelligent systems do not only help in traffic monitoring but also in commuter safety, law enforcement and commercial applications. The proposed Saudi Arabia Vehicle License plate recognition system splits into three major parts, firstly extraction of a license plate region secondly segmentation of the plate characters and lastly recognition of each character. This act is quite challenging due to the multiformity of plate formats and the nonuniform outdoor illumination conditions during image collection. In this paper recognition of the license plates is achieved by the implementation of the Learning Vector Quantization artificial neural network. Their results are based upon their completeness in the Saudi Arabia Vehicle License plate character recognition and theirs have obtained encouraging results from proposed technique.
Handwriting is one of the most important means of daily communication. Although the problem of handwriting recognition has been considered for more than 60 years there are still many open issues, especially in the task of unconstrained... more
Handwriting is one of the most important means of daily communication. Although the problem of handwriting recognition has been considered for more than 60 years there are still many open issues, especially in the task of unconstrained handwritten sentence recognition. This paper focuses on the automatic system that recognizes continuous English sentence through a mouse-based gestures in real-time based on Artificial Neural Network. The proposed Artificial Neural Network is trained using the traditional backpropagation algorithm for self supervised neural network which provides the system with great learning ability and thus has proven highly successful in training for feed-forward Artificial Neural Network. The designed algorithm is not only capable of translating discrete gesture moves, but also continuous gestures through the mouse. In this paper we are using the efficient neural network approach for recognizing English sentence drawn by mouse. This approach shows an efficient wa...
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Handwriting recognition is a challenging task for many real-world applications such as document authentication, form processing, historical documents. This paper focuses on the comparative study on off-line handwriting recognition system... more
Handwriting recognition is a challenging task for many real-world applications such as document authentication, form processing, historical documents. This paper focuses on the comparative study on off-line handwriting recognition system and Printed Characters by taking Arabic handwriting. The off-line Handwriting Recognition methods for Arabic words which being often used among then across the Middle East and North Africa people. In this paper we are proposing off-line Arabic handwriting and printed characters and the language used by the majority of the Middle East. We are using discrete Hidden Markov Models (HMM) for Arabic handwriting and printed characters for the final recognition. In this paper after preprocessing step the characters are auto-segmented using a recursive algorithm as sequences of connected neighbors along lines and curves and Arabic words are first pre-classified into one of known character groups, based on the structural properties of the text line. The propo...
— Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
— Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and no...
A new compressed video secure steganography (CVSS) rule is planned. Within the rule, embedding and detection operations square measure each dead entirely within the compressed domain, with no would like for the compression method. The new... more
A new compressed video secure steganography (CVSS) rule is planned. Within the rule, embedding and detection operations square measure each dead entirely within the compressed domain, with no would like for the compression method. The new criteria using applied math visibility of contiguous frames is employed to regulate the embedding strategy and capability that will increase the safety of planned rule. Therefore, the collusion resistant properties square measure obtained. Video stegnoanalysis with closedloop system feedback manner is style as a checker to search out obvious bugs. Experimental results showed this theme is applied on compressed video steganography with high security properties. Keywords— Higher LSB, Data Hiding, Extraction, Mean Square Error, PSNR, AVI Video.
Research Interests:
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and norm...
Forecasting is the process of computation in unknown situations from the historical data. Financial forecasting and planning is usually an essential part of the business plan, and would be done as part of setting up the organization and... more
Forecasting is the process of computation in unknown situations from the historical data. Financial forecasting and planning is usually an essential part of the business plan, and would be done as part of setting up the organization and receive funds. Financial forecasting and planning is also an essential activity to confirm a good management, keeping the organization financially sound is a key objective. The prediction of stock market has been a long time tempting topic for researchers from different fields. Stock analysts use various forecasting methods to determine how a stock's price will move in the ensuing day. The purpose of this paper is to explore the radial basis function (RBF) and function linked artificial neural network (FLANN) algorithms for forecasting of financial data. We have based our models on data taken and compared those using historical data from the Bombay Stock Exchange (BSE). The RBF and FLANN parameters updated by Particle swarm optimization (PSO). In...
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that... more
Big Data make conversant with novel technology, skills and processes to your information architecture and the people that operate, design, and utilization them. The big data delineate a holistic information management contrivance that comprise and integrates numerous new types of data and data management together conventional data. The Hadoop is an unlocked source software framework licensed under the Apache Software Foundation, render for supporting data profound applications running on huge grids and clusters, to proffer scalable, credible, and distributed computing. This is invented to scale up from single servers to thousands of machines, every proposition local computation and storage. In this paper, we have endeavored to converse about on the taxonomy for big data and Hadoop technology. Eventually, the big data technologies are necessary in providing more actual analysis, which may leadership to more concrete decision-making consequence in greater operational capacity, cost de...
Research Interests:
The countenance recognition presents a challenging problem in the field of image analysis and computer vision. Also, it received a good attention over the last few years. The applications of countenance recognition in the areas such as... more
The countenance recognition presents a challenging problem in the field of image analysis and computer vision. Also, it received a good attention over the last few years. The applications of countenance recognition in the areas such as person tracking, surveillance, protection, entertainment, theft prevention, as easily as in the growth of human machine interfaces. It has been shown that precision in countenance is crucial to countenance recognition algorithms. An error of a few pixels in countenance will produce an important reduction in countenance recognition rates. In this paper, two approaches are proposed for use in countenance recognition of human. Firstly, Bacterial Foraging Optimization (BFO) and secondly, Particle Swarm Optimization (PSO). The Bacterial Foraging Optimization in which the features extracted from Linear Discriminant Analysis (LDA) and Independent Component Analysis (ICA) are optimized. The Particle Swarm Optimization (PSO), which optimizes the transform coef...
The data mining techniques have the ability to discover hidden patterns or correlation among the objects in the medical data. There are many areas that adapt data mining techniques, namely marketing, stock, health care sector and so on.... more
The data mining techniques have the ability to discover hidden patterns or correlation among the objects in the medical data. There are many areas that adapt data mining techniques, namely marketing, stock, health care sector and so on. In the health care industry produces gigantic quantities of data that clutches complex information relating to the sick person and their medical conditions. The data mining has an infinite potential to make use of healthcare data more effectually and efficiently to predict various kinds of disease. The present-time healthcare industry heart ailment is a term that assigns to an enormous number of health care circumstances related to heart. These medical circumstances relate to the unexpected health circumstance that straight control the cardiac.  In this paper we are using a ROCK algorithm because it uses Jaccard coefficient on the contrary using the distance measures to find the similarity between the data or documents to classify the clusters and th...
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line... more
Handwriting recognition refers to the identification of written characters. Handwriting recognition has become an acute research area in recent years for the ease of access of computer science. In this paper primarily discussed On-line and Off-line handwriting recognition methods for Arabic words which are often used among then across the Middle East and North Africa People. Arabic word online handwriting recognition is a very challenging task due to its cursive nature. Because of the characteristic of the whole body of the Arabic script, namely connectivity between the characters, thereby the segmentation of An Arabic script is very difficult. In this paper we introduced an Arabic script multiple classifier system for recognizing notes written on a Starboard. This Arabic script multiple classifier system combines one off-line and on-line handwriting recognition systems. The Arabic script recognizers are all based on Hidden Markov Models but vary in the way of preprocessing and normalization. To combine the Arabic script output sequences of the recognizers, we incrementally align the word sequences using a norm string matching algorithm. The Arabic script combination we could increase the system performance over the excellent character recognizer by about 3%. The proposed technique is also the necessary step towards character recognition, person identification, personality determination where input data is processed from all perspectives.
Digital waterm arking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this... more
Digital waterm arking is a new method of protecting multimedia content from unauthorized copying. A digital multimedia technology has offered many facilities in the transmission, reproduction and manipulation of data. However, this advance has also brought the problem such as copyright protection for content providers. Copyright protection of images has become a major concern with the rapid expansion of the Internet, which contains millions of freely available images. Digital watermarking is one of the proposed solutions for copyright protection of multimedia and is becoming a m ajor player not only for use in images but also in the latest technology such as audio, im age and video. In this paper robustness of digital image watermarking algorithm based on transforming domain. We are proposing a robust combined Discrete Laguerre Transform (DLT) and Discrete Wavelet Transform (DWT) watermark transformation algorithm. Experimental results show that the higher robustness against common ...
Research Interests:
The subject "quality" is nowadays, in a globalized world, one of the key concerns of businessmen to face the competition on industries and service areas. Financial groups are measuring no efforts to achieve quality excellence,... more
The subject "quality" is nowadays, in a globalized world, one of the key concerns of businessmen to face the competition on industries and service areas. Financial groups are measuring no efforts to achieve quality excellence, starting by customer services and relationship. Indian banking sector opened its doors to private and international players after the economic liberalization in the year 1991. It has been almost 2 decades of operation of the private banks in India. Much has evolved in the overall structure of banking during this time but have the private banks delivered the type of quality that the customers expect them to. This research is an effort to evaluate the service quality of the private banks in India. The study is based on primary data collected in the cities of Delhi and NCR through a structured questionnaire designed on the basis of SERVQUAL Model. The banks under study are the five top private banks from Delhi and NCR region. The study has found that no...
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things... more
Recent years have seen the swift development and deployment of Internet-of-Things (IoT) applications in a variety of application domains. In this scenario, people worldwide are now ready to delight the benefits of the Internet of Things (IoT). The IoT is emerging as the third wave in the evolution of the Internet. The 1990s' Internet wave connected 1.2 billion subscribers while the 2000s' mobile wave connected another 2.4 billion. Actually, IoT is expected to consist of more than 84 billion connected devices generating 186 zettabyte of data by 2025, in the opinion of IDC. It includes major types of networks, such as distributed, ubiquitous, grid, and vehicular, these have conquered the world of information technology over a decade. IoT is growing fast across several industry verticals along with increases in the number of interconnected devices and diversify of IoT applications. In spite of the fact that, IoT technologies are not reaching maturity yet and there are many chal...
Forecasting is the process of computation in unknown situations from the historical data. Financial forecasting and planning is usually an essential part of the business plan, and would be done as part of setting up the organization and... more
Forecasting is the process of computation in unknown situations from the historical data. Financial forecasting and planning is usually an essential part of the business plan, and would be done as part of setting up the organization and receive funds. Financial forecasting and planning is also an essential activity to confirm a good management, keeping the organization financially sound is a key objective. The prediction of stock market has been a long time tempting topic for researchers from different fields. Stock analysts use various forecasting methods to determine how a stock's price will move in the ensuing day. The purpose of this paper is to explore the radial basis function (RBF) and function linked artificial neural network (FLANN) algorithms for forecasting of financial data. We have based our models on data taken and compared those using historical data from the Bombay Stock Exchange (BSE). The RBF and FLANN parameters updated by Particle swarm optimization (PSO). In this paper, we have examined this algorithm on a number of various parameters including error convergence and the Mean Average Percentage Error (MAPE) and comparative assessment of the RBF and FLANN algorithms is done. The proposed method indeed can help investors consistently receive gains. Finally, a simple merchandise model is established to study the accomplishment of the proposed prediction algorithm against other criterion.
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing... more
The breakthrough in wireless networking has prompted a new concept of computing, called mobile computing in which users tote portable devices have access to a shared infrastructure, independent of their physical location. Mobile computing is becoming increasingly vital due to the increase in the number of portable computers and the aspiration to have continuous network connectivity to the Internet irrespective of the physical location of the node. Mobile computing systems are computing systems that may be readily moved physically and whose computing ability may be used while they are being moved. Mobile computing has rapidly become a vital new example in today's real world of networked computing systems. It includes software, hardware and mobile communication. Ranging from wireless laptops to cellular phones and WiFi/Bluetooth-enabled PDA's to wireless sensor networks; mobile computing has become ubiquitous in its influence on our quotidian lives. In this paper various types of mobile devices are talking and they are inquiring into in details and existing operation systems that are most famed for mentioned devices are talking. Another aim of this paper is to point out some of the characteristics, applications, limitations, and issues of mobile computing.
Now a day’s, well known accepted soft computing methods likes as neural sets and fuzzy sets, adaptive evolutionary computing and neuro fuzzy based system, and Intelligence Computing’s etc. for carrying out numerical varying data... more
Now a day’s, well known accepted soft computing methods likes as neural sets and fuzzy sets, adaptive evolutionary computing and neuro fuzzy based system, and Intelligence Computing’s etc. for carrying out numerical varying data simulation analysis. These approaches become applied on different engineering problems as independently. In this research paper many introducer and researchers describe the soft computing review technique which using for solving real domains problems and simulate the reappearance of the intelligence, as adaptation and learning for real times engineering problems... The intelligence computing Computational intelligence is a universal approximate, and it has the great function of non-linear mapping and optimization techniques. Also we discuss a brief of intelligent systems in Neural Network. And discuss it features and constituents of real problems. We concentrate on solving real domain problems in Neural Network of Intelligent System as Intelligence computing and soft computing
There is no suspicion that IoT has added a new dimension to the living being by the link between smart objects. Thus making the link among any media and anything at any place and anytime was appreciable. Under the umbrella of the Internet... more
There is no suspicion that IoT has added a new dimension to the living being by the link between smart objects. Thus making the link among any media and anything at any place and anytime was appreciable. Under the umbrella of the Internet of Things (IoT) the number of interconnected devices is expected to grow exponentially toward more than 34 billion devices until 2021. IoT will propose the unique identification of the objects and their virtual representation as the basis for autonomously development of applications and services. These will be characterized by enormous and self-governing data capture, incident transfer, network connectivity and interoperability. This technology has a lot of applications in heterogeneous fields. The IoT technology and applications are likely to be major drivers of investment and innovation in the communications sector, over the forthcoming years, delivering the valued advantage to citizens, client and industrial end-users. These will lead to the introduction of many new and modern services. It will permit data to be transmitted between many various types of devices, enhance the safety of transportation, and decrease the consumption of energy and enhance our health. In this paper, we are briefly discussing about the Internet of Things and applications in several fields. The IoT applications are using at the edge of the network sensors accumulate data on a computing and communicating device and actuators to perform distinguished tasks controlled by these devices.
Today scenario the field of Intelligent Transportation Systems (ITS) has witnessed significantly increased activity in recent years, with the application of modern control, communications, and roadway infrastructure and information... more
Today scenario the field of Intelligent Transportation Systems (ITS) has witnessed significantly increased activity in recent years, with the application of modern control, communications, and roadway infrastructure and information technologies to vehicles. The ITS is the application of computer, electronics, and communication technologies and management plan in an integrated manner to endue traveler information to enhance the protection and dexterity of the road transportation systems. Presently many countries place stakes on like technologies as autonomous transportation vehicles and cooperative intelligent transportation systems. Intelligent Transport System (ITS) aims to achieve traffic efficiency by minimizing traffic problems. It improves users with prior information about traffic, local ease of use real-time running information. The paper aims at setting a system for traffic safety on the highway, it focuses mainly on evaluation if their status and determination of their leak points. This was done on the basis of information gathered from the National Corporation for roads and Bridges and traffic police department report for 2016 & 2019 from the Sudan and field surveys are attainable, and applied in geographic information system (GIS).
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information... more
Wireless communication is the transfer of information over a distance, without using cables or conductors. The distances involved may be short or long. Wireless communication has such features as freedom of access to the information transmitted via wireless networks that puts out different kinds of unauthorized actions of breakers. Solution of this problem is applying cryptography in wireless networks. We proposed 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced Encryption Standard (AES). Efficiency on both software and hardware platforms is a remarkable characteristic of Camellia in addition to its high level of security. It is confirmed that Camellia provides strong security against differential and linear cryptanalysis. Compared to the AES finalists, i.e. MARS, RC6, Rijndael, Serpent, and Twofish, Camellia offers at least comparable encryption speed in software and hardware. In this paper the author have proposed a block ciphering standard in providing confidentiality, security, integrity in wireless communication presently used in KSA.