Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583901
G. Balamurugan, M. Senthil
As the growth of technology every information is passed widely through internet. To provide the security to the information many cryptography algorithms is introduced. Now various researches are going on for the protection to the medical information. As it was under a wide research field, to perform the security to the medical information using the finger print biometric and reversible watermarking techniques in the MDBMS and providing CIA. To provide integrity for the medical data and to detect the medical image modification using the finger prints biometric based cryptosystem and reversible watermarking technique. Proposed system uses the finger print biometric for authentication, symmetric as well as public key for cryptography process and reversible watermarking the encrypted data into medical image. To provide CIA methodology for the MDBMS and also ensuring conformation SMS to the patient for the convenient, that their information had reached safely to the corresponding destination. Implementation of proposed work has been analyzed using performance measures and implementation is carried out.
{"title":"A fingerprint based reversible watermarking system for the security of medical information","authors":"G. Balamurugan, M. Senthil","doi":"10.1109/STARTUP.2016.7583901","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583901","url":null,"abstract":"As the growth of technology every information is passed widely through internet. To provide the security to the information many cryptography algorithms is introduced. Now various researches are going on for the protection to the medical information. As it was under a wide research field, to perform the security to the medical information using the finger print biometric and reversible watermarking techniques in the MDBMS and providing CIA. To provide integrity for the medical data and to detect the medical image modification using the finger prints biometric based cryptosystem and reversible watermarking technique. Proposed system uses the finger print biometric for authentication, symmetric as well as public key for cryptography process and reversible watermarking the encrypted data into medical image. To provide CIA methodology for the MDBMS and also ensuring conformation SMS to the patient for the convenient, that their information had reached safely to the corresponding destination. Implementation of proposed work has been analyzed using performance measures and implementation is carried out.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121019969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583923
Trupti R. Patil, Amol Dhankar
The main challenging areas in VLSI are performance, cost, and power dissipation. The demand for portable computing devices and communications system are increasing rapidly. These applications require low power dissipation VLSI circuits. The power dissipation during test mode is 200% more than in normal mode. This research article proposed a logic BIST using low power linear feedback shift register (LFSR) to generate low power test patterns. The designed architecture is programmed using VHDL and simulated using free active HDL tool. The experimental results demonstrate significant power reduction by low power TPG than compared to standard LFSR.
{"title":"A review on power optimized TPG using LP-LFSR for low power BIST","authors":"Trupti R. Patil, Amol Dhankar","doi":"10.1109/STARTUP.2016.7583923","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583923","url":null,"abstract":"The main challenging areas in VLSI are performance, cost, and power dissipation. The demand for portable computing devices and communications system are increasing rapidly. These applications require low power dissipation VLSI circuits. The power dissipation during test mode is 200% more than in normal mode. This research article proposed a logic BIST using low power linear feedback shift register (LFSR) to generate low power test patterns. The designed architecture is programmed using VHDL and simulated using free active HDL tool. The experimental results demonstrate significant power reduction by low power TPG than compared to standard LFSR.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125596699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-02-01DOI: 10.1109/STARTUP.2016.7583975
Pallavi Mahure
Finding relevant information is a big challenge in today's information retrieval domain. Various applications need to find objects closest to the mentioned location that has a set of keywords. In a spatial dataset, objects are linked with some keyword(s) which specify their features. Closest Keywords is a method to query objects, using keyword cover. Algorithm based on Closest Keywords Search which exhaustively combines objects from different query keywords for generating candidate keyword covers. The increasing importance of keyword rating in object evaluation helps for the better decision making. This triggers to generate Best Keyword Cover which mainly considers inter-objects distance as well as the keyword rating of objects. When the number of query keywords gets increases, the performance of the closest keyword cover search algorithm drops significantly as a result of huge candidate keyword covers generated. To overcome this drawback, much more scalable algorithm known as keyword nearest neighbor expansion (keyword-NNE) has been proposed. Keyword-NNE algorithm significantly reduces number of candidate keyword covers generated.
{"title":"Better performing keywords cover search","authors":"Pallavi Mahure","doi":"10.1109/STARTUP.2016.7583975","DOIUrl":"https://doi.org/10.1109/STARTUP.2016.7583975","url":null,"abstract":"Finding relevant information is a big challenge in today's information retrieval domain. Various applications need to find objects closest to the mentioned location that has a set of keywords. In a spatial dataset, objects are linked with some keyword(s) which specify their features. Closest Keywords is a method to query objects, using keyword cover. Algorithm based on Closest Keywords Search which exhaustively combines objects from different query keywords for generating candidate keyword covers. The increasing importance of keyword rating in object evaluation helps for the better decision making. This triggers to generate Best Keyword Cover which mainly considers inter-objects distance as well as the keyword rating of objects. When the number of query keywords gets increases, the performance of the closest keyword cover search algorithm drops significantly as a result of huge candidate keyword covers generated. To overcome this drawback, much more scalable algorithm known as keyword nearest neighbor expansion (keyword-NNE) has been proposed. Keyword-NNE algorithm significantly reduces number of candidate keyword covers generated.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126411963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The most accepted payment mode is credit card for both online and offline in today's world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. Hence, risks of fraud transaction using credit card has also been increasing. In the existing credit card fraud detection business processing system, fraudulent transaction will be detected after transaction is done. It is difficult to find out fraudulent and regarding loses will be barred by issuing authorities. Hidden Markov Model is the statistical tools for engineer and scientists to solve various problems. In this paper, it is shown that credit card fraud can be detected using Hidden Markov Model during transactions. Hidden Markov Model helps to obtain a high fraud coverage combined with a low false alarm rate.
{"title":"Study of Hidden Markov Model in credit card fraudulent detection","authors":"V. Bhusari, S. Patil","doi":"10.5120/2428-3263","DOIUrl":"https://doi.org/10.5120/2428-3263","url":null,"abstract":"The most accepted payment mode is credit card for both online and offline in today's world, it provides cashless shopping at every shop in all countries. It will be the most convenient way to do online shopping, paying bills etc. Hence, risks of fraud transaction using credit card has also been increasing. In the existing credit card fraud detection business processing system, fraudulent transaction will be detected after transaction is done. It is difficult to find out fraudulent and regarding loses will be barred by issuing authorities. Hidden Markov Model is the statistical tools for engineer and scientists to solve various problems. In this paper, it is shown that credit card fraud can be detected using Hidden Markov Model during transactions. Hidden Markov Model helps to obtain a high fraud coverage combined with a low false alarm rate.","PeriodicalId":355852,"journal":{"name":"2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129592913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}