首页 > 最新文献

Asian Journal of Science and Applied Technology最新文献

英文 中文
Effective Machine Learning Techniques used in Big Data Analytics 大数据分析中使用的有效机器学习技术
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.942
S. Senthil Kumar, V. Kathiresan
Big data is a general term for massive amount of digital data being collected from various sources that are too large and raw in form. Big data deals with new challenges like complexity, security, risks to privacy. Big data is redefining the data management from extraction, transformation and processing to cleaning and reducing [1].There has been a lot of growth in the amount of data generated by web these days. The data has been so large that it becomes difficult to analyse it with the help of our traditional mining methods. Big data term has been coined for data that exceeds the processing capability [2]. Moreover, the rising data volume has contributed to the increasing demand for big data analytics.
大数据是指从各种来源收集的大量数字数据的总称,这些数据过于庞大且形式原始。大数据处理了复杂性、安全性、隐私风险等新挑战。大数据正在重新定义数据管理,从提取、转换、处理到清洗、精简[1]。如今,网络产生的数据量有了很大的增长。数据是如此之大,以至于很难用传统的挖掘方法来分析它。“大数据”一词被用来形容超出处理能力的数据[2]。此外,不断增长的数据量也促进了对大数据分析的需求。
{"title":"Effective Machine Learning Techniques used in Big Data Analytics","authors":"S. Senthil Kumar, V. Kathiresan","doi":"10.51983/ajsat-2017.6.1.942","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.942","url":null,"abstract":"Big data is a general term for massive amount of digital data being collected from various sources that are too large and raw in form. Big data deals with new challenges like complexity, security, risks to privacy. Big data is redefining the data management from extraction, transformation and processing to cleaning and reducing [1].There has been a lot of growth in the amount of data generated by web these days. The data has been so large that it becomes difficult to analyse it with the help of our traditional mining methods. Big data term has been coined for data that exceeds the processing capability [2]. Moreover, the rising data volume has contributed to the increasing demand for big data analytics.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":" 36","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132094497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmentation of Fused CT and MRI Images with Brain Tumor 颅脑肿瘤CT与MRI融合图像分割
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.945
K. Pradeep, S. Balasubramanian, Hemalatha Karnan, K. Karthick Babu
This paper proposes an approach for combining two multimodality images [CT and MRI] with tumor cell, helps to delineate the anatomical and physiological differences from one dataset to another using Wavelet transform and its inverse transform. Image fusion is the process that matches two or more image datasets resulting in a single image dataset. There are many fusion processes that can take place at different levels, in this paper focuses on pixel level fusion process, where each pixel from the input images [CT and MRI] are taken as composite input data for further processing. In this project the next proposed step is to segment the tumor using Otsu’s Algorithm. Segmentation process is performed to detect the tumor from all the above three images i.e., CT, MRI and Fused Image by using OTSU’s segmentation algorithm for future comparison. The fused image contains both soft tissue information’s like Tumor and also hard tissues information’s like bones, helpful for physician and doctors to quantify the area of tumor for surgical planning. This paper also reduces the treatment cost to patient where there is no need of separate imaging device to obtain CT/MRI imaging modality.
本文提出了一种将两种多模态图像[CT和MRI]与肿瘤细胞相结合的方法,利用小波变换及其逆变换来描绘一个数据集与另一个数据集的解剖和生理差异。图像融合是将两个或多个图像数据集匹配成单个图像数据集的过程。有许多融合过程可以在不同的层次上进行,本文重点研究像素级融合过程,将输入图像[CT和MRI]中的每个像素作为复合输入数据进行进一步处理。在这个项目中,下一步是使用Otsu算法对肿瘤进行分割。通过OTSU的分割算法,对以上三幅图像(CT、MRI和Fused Image)进行分割处理,检测出肿瘤,以便以后进行比较。融合后的图像既包含了肿瘤等软组织信息,也包含了骨骼等硬组织信息,有助于医师和医生量化肿瘤的面积,为手术规划提供依据。本文还降低了患者无需单独成像设备即可获得CT/MRI成像方式的治疗成本。
{"title":"Segmentation of Fused CT and MRI Images with Brain Tumor","authors":"K. Pradeep, S. Balasubramanian, Hemalatha Karnan, K. Karthick Babu","doi":"10.51983/ajsat-2017.6.1.945","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.945","url":null,"abstract":"This paper proposes an approach for combining two multimodality images [CT and MRI] with tumor cell, helps to delineate the anatomical and physiological differences from one dataset to another using Wavelet transform and its inverse transform. Image fusion is the process that matches two or more image datasets resulting in a single image dataset. There are many fusion processes that can take place at different levels, in this paper focuses on pixel level fusion process, where each pixel from the input images [CT and MRI] are taken as composite input data for further processing. In this project the next proposed step is to segment the tumor using Otsu’s Algorithm. Segmentation process is performed to detect the tumor from all the above three images i.e., CT, MRI and Fused Image by using OTSU’s segmentation algorithm for future comparison. The fused image contains both soft tissue information’s like Tumor and also hard tissues information’s like bones, helpful for physician and doctors to quantify the area of tumor for surgical planning. This paper also reduces the treatment cost to patient where there is no need of separate imaging device to obtain CT/MRI imaging modality.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124260281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fourier Transform Based Classification Aboriginal Algorithm 基于傅里叶变换的土著分类算法
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.944
P. Senthil
Object apprehension and article acceptance are capital apparatus of every computer eyes system. Despite the top computational complication and added problems accompanying to after adherence and accuracy, Zernike moments of 2D images (ZMs) accept apparent animation if acclimated in article acceptance and accept been acclimated in various angel assay applications. In this work, we adduce a atypical adjustment for accretion ZMs via Fast Fourier Transform (FFT). Notably, this is the aboriginal algorithm that can accomplish ZMs up to acutely high orders accurately, e.g., it can be acclimated to accomplish ZMs for orders up to 1000 or even higher. Furthermore, the proposed adjustment is as well simpler and faster than the added methods due to the availability of FFT software and hardware. The accuracies and after adherence of ZMs computed via FFT accept been confirmed using the orthogonality property. We as well acquaint normalizing ZMs with Neumann agency if the image is anchored in a beyond grid, and blush angel about-face based on RGB normalization of the reconstructed images. Astonishingly, higher-order angel about-face abstracts appearance that the proposed methods are superior, both quantitatively and subjectively, compared to the q-recursive method.
物体理解和物品接收是每个计算机眼系统的重要组成部分。尽管最高的计算复杂性和附加的问题后的依从性和准确性,泽尼克矩的二维图像(ZMs)接受明显的动画,如果适应在文章接受和接受已适应在各种角度分析应用。在这项工作中,我们通过快速傅立叶变换(FFT)引入了吸积ZMs的非典型调整。值得注意的是,这是一种可以精确地完成高阶zm的原始算法,例如,它可以适应完成高达1000甚至更高阶的zm。此外,由于FFT软件和硬件的可用性,所提出的调整也比添加的方法更简单和更快。利用正交性证实了FFT计算的ZMs的准确性和粘附性。我们还熟悉了在超网格中锚定图像时使用Neumann代理归一化zm,以及基于重构图像的RGB归一化的腮红角度翻转。令人惊讶的是,与q递归方法相比,高阶天使翻转抽象了所提出的方法在数量和主观上都优于q递归方法的外观。
{"title":"Fourier Transform Based Classification Aboriginal Algorithm","authors":"P. Senthil","doi":"10.51983/ajsat-2017.6.1.944","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.944","url":null,"abstract":"Object apprehension and article acceptance are capital apparatus of every computer eyes system. Despite the top computational complication and added problems accompanying to after adherence and accuracy, Zernike moments of 2D images (ZMs) accept apparent animation if acclimated in article acceptance and accept been acclimated in various angel assay applications. In this work, we adduce a atypical adjustment for accretion ZMs via Fast Fourier Transform (FFT). Notably, this is the aboriginal algorithm that can accomplish ZMs up to acutely high orders accurately, e.g., it can be acclimated to accomplish ZMs for orders up to 1000 or even higher. Furthermore, the proposed adjustment is as well simpler and faster than the added methods due to the availability of FFT software and hardware. The accuracies and after adherence of ZMs computed via FFT accept been confirmed using the orthogonality property. We as well acquaint normalizing ZMs with Neumann agency if the image is anchored in a beyond grid, and blush angel about-face based on RGB normalization of the reconstructed images. Astonishingly, higher-order angel about-face abstracts appearance that the proposed methods are superior, both quantitatively and subjectively, compared to the q-recursive method.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129935776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design and Development of Finical Frame on Reaction performance Expert Routing Protocol in Sloppy WSN 草率无线传感器网络中反应性能专家路由协议金融框架的设计与开发
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.939
S. Ravichandran, R. Benjohnson, S. Lakshminarayanan
Wireless Sensor Networks accept abundant abeyant to abutment several important wireless applications, together with concurrent disc statement, remedial application, inspection purpose sensor networks, automated applications, aggressive surveillance and home networking applications. But there are two arduous issues (i) advice bandwidth and (ii) activity are actual important to architecture wireless and adaptable systems because these are actual abundant bound in arrangement environment. Therefore it requires able advice and architecture techniques to access bandwidth as able-bodied as activity able protocol. The lot of able acquisition agreement Lower Activity Adaptive Absorption Hierarchy in wireless sensor networks. Lower Activity Adaptive Absorption Hierarchy uses the abstraction of activating absorption if sensor nodes are deploying about area amount of array ampules on the network. This cardboard describes the arrangement superior that depends on altered characteristics of abstracts manual as a Modification on LEACH protocol. In this paper, we discussed and explain the allegory of magnitude, phase, appearance delay, accumulation delay, amplitude of broadcasting and activity burning respectively.
无线传感器网络可以广泛应用于几个重要的无线应用,包括并发光盘声明、补救应用、检测目的传感器网络、自动化应用、积极监控和家庭网络应用。但是有两个棘手的问题:(1)建议带宽和(2)活动对于构建无线和自适应系统是非常重要的,因为它们在布置环境中是实际的丰富边界。因此,它需要有效的建议和架构技术来访问带宽,就像有效的协议一样。无线传感器网络中的低活度自适应吸收层次结构。如果传感器节点在网络上部署了大约面积的阵列样本,则低活动自适应吸收层次使用激活吸收的抽象。这张纸板描述了作为LEACH协议的修改而依赖于改变摘要手册特性的优越安排。本文分别对量级、相位、表象延迟、积累延迟、传播幅度和活动燃烧的寓言进行了讨论和解释。
{"title":"Design and Development of Finical Frame on Reaction performance Expert Routing Protocol in Sloppy WSN","authors":"S. Ravichandran, R. Benjohnson, S. Lakshminarayanan","doi":"10.51983/ajsat-2017.6.1.939","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.939","url":null,"abstract":"Wireless Sensor Networks accept abundant abeyant to abutment several important wireless applications, together with concurrent disc statement, remedial application, inspection purpose sensor networks, automated applications, aggressive surveillance and home networking applications. But there are two arduous issues (i) advice bandwidth and (ii) activity are actual important to architecture wireless and adaptable systems because these are actual abundant bound in arrangement environment. Therefore it requires able advice and architecture techniques to access bandwidth as able-bodied as activity able protocol. The lot of able acquisition agreement Lower Activity Adaptive Absorption Hierarchy in wireless sensor networks. Lower Activity Adaptive Absorption Hierarchy uses the abstraction of activating absorption if sensor nodes are deploying about area amount of array ampules on the network. This cardboard describes the arrangement superior that depends on altered characteristics of abstracts manual as a Modification on LEACH protocol. In this paper, we discussed and explain the allegory of magnitude, phase, appearance delay, accumulation delay, amplitude of broadcasting and activity burning respectively.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124872832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Graphical Authentication System 一个高效的图形认证系统
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.937
Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta
Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.
密码认证主要用于计算机安全和隐私方面的应用。然而,选择错误的密码和以不安全的方式输入密码等人为行为被认为是身份验证过程中“最薄弱的环节”。用户通常使用弱密码,而不是任意的字母数字字符串,更多的是基于他们的个人信息。随着新技术的出现和移动应用程序的堆积,用户可以随时随地在各种设备上使用该应用程序。虽然这种进化很方便,但它也增加了将密码暴露于肩部冲浪攻击的可能性。攻击者可以直接观察或使用外部记录设备收集用户凭证。为了克服这一问题,提出了一种新的基于图形密码的认证系统Pass Matrix,以抵抗肩冲浪攻击。通过一次性代码和覆盖整个通过图像范围的水平和垂直条,即使攻击者进行多次基于摄像头的攻击,也不会给攻击者提供任何提示来找出或缩小密码。我们将实现一个Pass Matrix原型,从实验结果来看,所提出的系统将在保持可用性的同时获得更好的抗肩冲浪攻击能力。
{"title":"An Efficient Graphical Authentication System","authors":"Aayush Kumar, Keshav Kumar, Siddharth Shekhar Singh, M. Vaneeta","doi":"10.51983/ajsat-2017.6.1.937","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.937","url":null,"abstract":"Password authentication is majorly used in applications for computer security and privacy. However, human actions such as selecting bad passwords and inputting passwords in an insecure way are considered as” the weakest link” in the authentication process. Rather than arbitrary alphanumeric string, users generally use weak password, more often based on their personal information. With new technologies coming up and mobile apps piling up, users can use the application anytime and anywhere with various devices. Although the evolution is convenient but it also increases the probability of exposing passwords to shoulder surfing attacks. Attackers can observe directly or use external recording devices to collect users’ credentials. To overcome this problem, a novel authentication system Pass Matrix, based on graphical passwords is proposed to resist shoulder surfing attacks. With a one-time code and horizontal and vertical bars covering the entire scope of pass-images, Pass Matrix will offer no hint to attackers to figure out or narrow down the password even they conduct multiple camera-based attacks. We will implement a Pass Matrix prototype and from the experimental result, the proposed system will achieve better resistance to shoulder surfing attacks while maintaining usability.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116624637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Programming Fault Prediction Using Quad Tree-Based Fluffy C-Means Clustering Algorithm 基于四叉树的蓬松c均值聚类算法的故障预测编程
Pub Date : 2017-05-05 DOI: 10.51983/ajsat-2017.6.1.938
S. Ravichandran, M. Umamaheswari, R. Benjohnson
Software measurements and blame information having a place with a past programming form are utilized to construct the product blame expectation show for the following arrival of the product. Unsupervised procedures like bunching might be utilized for blame expectation as a part of programming modules, all the more so in those situations where blame marks are not accessible. In this paper a Quad Tree-based Fuzzy C-Means calculation has been connected for anticipating deficiencies in program modules. The points of this paper are twofold. In the first place, Quad Trees are connected for observing the underlying group focuses to be contribution to the Fuzzy C-Means Algorithm. An information edge parameter oversees the quantity of introductory bunch focuses and by shifting the limit the client can create wanted beginning group focuses. The idea of grouping increase has been utilized to decide the nature of bunches for assessment of the Quad Tree-based introduction calculation when contrasted with other instatement procedures. These bunches got by Quad Tree-based calculation were found to have most extreme pick up qualities. Second, the Quad Tree based calculation is connected for anticipating shortcomings in program modules. The general blunder rates of this forecast approach are contrasted with other existing calculations and are observed to be better in the vast majority of the cases.
利用具有过去编程形式的软件度量和责任信息来构建产品后续到达的产品责任期望显示。像群集这样的无监督过程可以作为编程模块的一部分用于责备期望,在无法访问责备标记的情况下更是如此。本文提出了一种基于四叉树的模糊c均值计算方法来预测程序模块的不足。本文的观点是双重的。首先,连接四叉树以观察底层组焦点,从而为模糊c均值算法做出贡献。信息边缘参数监督入门组焦点的数量,并通过移动限制客户端可以创建所需的起始组焦点。与其他安装程序相比,利用分组增加的思想来确定束的性质,以评估基于四叉树的引入计算。通过基于四叉树的计算得到的这些束被发现具有最极端的拾取品质。其次,结合基于四叉树的计算来预测程序模块的不足。这种预测方法的一般错误率与其他现有的计算方法进行了对比,并且在绝大多数情况下观察到更好。
{"title":"Programming Fault Prediction Using Quad Tree-Based Fluffy C-Means Clustering Algorithm","authors":"S. Ravichandran, M. Umamaheswari, R. Benjohnson","doi":"10.51983/ajsat-2017.6.1.938","DOIUrl":"https://doi.org/10.51983/ajsat-2017.6.1.938","url":null,"abstract":"Software measurements and blame information having a place with a past programming form are utilized to construct the product blame expectation show for the following arrival of the product. Unsupervised procedures like bunching might be utilized for blame expectation as a part of programming modules, all the more so in those situations where blame marks are not accessible. In this paper a Quad Tree-based Fuzzy C-Means calculation has been connected for anticipating deficiencies in program modules. The points of this paper are twofold. In the first place, Quad Trees are connected for observing the underlying group focuses to be contribution to the Fuzzy C-Means Algorithm. An information edge parameter oversees the quantity of introductory bunch focuses and by shifting the limit the client can create wanted beginning group focuses. The idea of grouping increase has been utilized to decide the nature of bunches for assessment of the Quad Tree-based introduction calculation when contrasted with other instatement procedures. These bunches got by Quad Tree-based calculation were found to have most extreme pick up qualities. Second, the Quad Tree based calculation is connected for anticipating shortcomings in program modules. The general blunder rates of this forecast approach are contrasted with other existing calculations and are observed to be better in the vast majority of the cases.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115076658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Queueing Systems Associated Random Evolutions With Branching Process 具有分支过程的随机演化排队系统研究
Pub Date : 2016-11-05 DOI: 10.51983/ajsat-2016.5.2.934
M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan
In this paper we deal with branching process in which each particle procedure offspring at the time of completion of its life-time L according to a probability generating functions. We obtain an integral equation for the joint generating function of the vector process and limiting distribution.
本文讨论了分支过程,在分支过程中,每个粒子过程在其生命周期L完成时根据概率生成函数产生子代。得到了矢量过程与极限分布联合生成函数的积分方程。
{"title":"A Study on Queueing Systems Associated Random Evolutions With Branching Process","authors":"M. Reni Sagayaraj, S. Anand Gnana Selvam, R. Reynald Susainathan","doi":"10.51983/ajsat-2016.5.2.934","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.934","url":null,"abstract":"In this paper we deal with branching process in which each particle procedure offspring at the time of completion of its life-time L according to a probability generating functions. We obtain an integral equation for the joint generating function of the vector process and limiting distribution.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123765303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hand Index: An Anthropo-Forensic Tool for Human Identification in India 手索引:印度人类鉴定的人类法医工具
Pub Date : 2016-11-05 DOI: 10.51983/ajsat-2016.5.2.936
Sangeeta Dey, Anup Kumar Kapoor
The aim of the study was to determine and classify the hand index of 200 individuals selected randomly within age group 18 – 65 years from Udaipur district, Rajasthan, India. The measured parameters are hand length and hand breadth. This study also attempt to compare the hand index obtained from direct as well as indirect (from hand print & hand outline) methods. Data were analyzed using SPSS Statistical software. Results shows that there were statistically significant differences in the hand parameters of male compared to female subjects for all observed parameters. It is interesting that hand index obtained from different methods doesn’t indicate variation however there exist statistically significant variation in terms of hand length and hand breadth. Also there is statistically significant difference between the hand dimensions obtained from different methods. Hand classification denoted that population of Rajasthan state belongs to dolichocheir (dch) group of hand for all the direct and indirect methods. The comparison of hand index with populations of 17 different states of India indicates that Indian population belongs to any category of hand index except hyperbrachycheir. Also an attempt has been made to observe the correlative effect of climate divisions of India with the hand categories. Comparison with 25 other foreign countries shows the existence of hyperbrachycheir that is broader large palm but short fingers. This shows that morphological characteristics of hand depend on many factors such as gender, ethnicity, socio-cultural domain, environment & genetic factors and it differs from region to region. Thus, it can be said that Identification of hand parameters is very helpful in concealing identity of mutilated remains in any disastrous act, also in examination of chance evidences in crime scene for criminal proceedings and this comparative data of hand index can also help to determine the resident place of an unknown individual.
该研究的目的是确定和分类从印度拉贾斯坦邦乌代普尔地区随机选择的年龄在18 - 65岁之间的200个人的手指数。测量参数为手长和手宽。本研究还试图比较直接和间接(手印和手轮廓)方法获得的手指数。数据采用SPSS统计软件进行分析。结果显示,男性受试者的手部参数与女性受试者相比,在所有观察参数上均有统计学差异。有趣的是,不同方法得到的手指数没有差异,但手长和手宽的差异有统计学意义。不同方法得到的手的尺寸也有统计学上的差异。手的分类表明,拉贾斯坦邦的人口属于手的所有直接和间接方法的dolichocheir (dch)组。手指数与印度17个不同邦的人口的比较表明,印度人口属于任何类别的手指数,除了hyperbrachycheir。本文还尝试观察了印度气候区划与手类的相关效应。与国外25个国家相比,存在手掌更宽、手指更短的“超短掌”。这表明,手的形态特征取决于性别、种族、社会文化领域、环境和遗传因素等多种因素,并因地区而异。因此,可以说,手参数的识别对于在任何灾难性行为中隐藏残害遗体的身份都有很大的帮助,对于刑事诉讼中审查犯罪现场的偶然证据也有很大的帮助,而且手指数的比较数据也可以帮助确定未知个体的居住地。
{"title":"Hand Index: An Anthropo-Forensic Tool for Human Identification in India","authors":"Sangeeta Dey, Anup Kumar Kapoor","doi":"10.51983/ajsat-2016.5.2.936","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.936","url":null,"abstract":"The aim of the study was to determine and classify the hand index of 200 individuals selected randomly within age group 18 – 65 years from Udaipur district, Rajasthan, India. The measured parameters are hand length and hand breadth. This study also attempt to compare the hand index obtained from direct as well as indirect (from hand print & hand outline) methods. Data were analyzed using SPSS Statistical software. Results shows that there were statistically significant differences in the hand parameters of male compared to female subjects for all observed parameters. It is interesting that hand index obtained from different methods doesn’t indicate variation however there exist statistically significant variation in terms of hand length and hand breadth. Also there is statistically significant difference between the hand dimensions obtained from different methods. Hand classification denoted that population of Rajasthan state belongs to dolichocheir (dch) group of hand for all the direct and indirect methods. The comparison of hand index with populations of 17 different states of India indicates that Indian population belongs to any category of hand index except hyperbrachycheir. Also an attempt has been made to observe the correlative effect of climate divisions of India with the hand categories. Comparison with 25 other foreign countries shows the existence of hyperbrachycheir that is broader large palm but short fingers. This shows that morphological characteristics of hand depend on many factors such as gender, ethnicity, socio-cultural domain, environment & genetic factors and it differs from region to region. Thus, it can be said that Identification of hand parameters is very helpful in concealing identity of mutilated remains in any disastrous act, also in examination of chance evidences in crime scene for criminal proceedings and this comparative data of hand index can also help to determine the resident place of an unknown individual.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126349350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Indian Internet Context: The User Base and Speed – An Overview 印度互联网背景:用户基础和速度-概述
Pub Date : 2016-11-05 DOI: 10.51983/ajsat-2016.5.2.933
P. K. Paul, A. Bhuimali, K. S. Shivraj
India is one of the important name in today’s world in terms of popularity, democracy, development, socialism and ancient history and heritage. Though India holds the record of ancient world, but it is also changes itself and the process is continuing the latest technologies and tools have widely utilizing in almost all the sectors and fields. The internet systems has grown with rapid manner in the last few decades. The services and user base have been changed rapidly with the help of several latest internet services. The internet users are increasing day by day due to many reasons. Urban and rural, both the sectors have improving the dispatching of internet and removing digital divide in many contexts. The paper has highlighted many aspects related to the internet in Indian context.
印度是当今世界上人气、民主、发展、社会主义、古老历史和遗产等方面的重要国家之一。虽然印度保持着古代世界的记录,但它也在改变自己,这个过程还在继续,最新的技术和工具在几乎所有部门和领域都得到了广泛的应用。在过去的几十年里,互联网系统以快速的方式发展。在几种最新互联网服务的帮助下,服务和用户基础已经迅速改变。由于许多原因,互联网用户日益增加。无论是城市还是农村,这两个部门都在改善互联网的调度,在许多情况下消除了数字鸿沟。这篇论文强调了印度背景下与互联网相关的许多方面。
{"title":"Indian Internet Context: The User Base and Speed – An Overview","authors":"P. K. Paul, A. Bhuimali, K. S. Shivraj","doi":"10.51983/ajsat-2016.5.2.933","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.933","url":null,"abstract":"India is one of the important name in today’s world in terms of popularity, democracy, development, socialism and ancient history and heritage. Though India holds the record of ancient world, but it is also changes itself and the process is continuing the latest technologies and tools have widely utilizing in almost all the sectors and fields. The internet systems has grown with rapid manner in the last few decades. The services and user base have been changed rapidly with the help of several latest internet services. The internet users are increasing day by day due to many reasons. Urban and rural, both the sectors have improving the dispatching of internet and removing digital divide in many contexts. The paper has highlighted many aspects related to the internet in Indian context.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127985586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study on Novel Method of Facial Image Compression Using Master Code 基于主码的人脸图像压缩新方法研究
Pub Date : 2016-11-05 DOI: 10.51983/ajsat-2016.5.2.932
M. Reni Sagayaraj, R. Sathishkumar, S. Anand Gnana Selvam
In this paper, face images are studied in the context of detection and recognition. In the literature, the problem of compressing human frontal facial images has been addressed. The images that are dealt are passport-type photos namely, full face, frontal view, plain background, no dark glasses, without hates and other non-standard clothing. Compression of Facial Images by using IDL is carried out in this paper. The facial images dealt with are passport-type photos-full face, frontal view. Three different photos of the same person are stored. A single code book is generated and compression is carried out. Appreciable PSNR values are obtained for different block sizes. This paper introduces a method to compress and decompress the facial image, so that it is visually appealing, at a quality sufficient to an un-mistakenly visually identify a given subject.
本文从检测和识别的角度对人脸图像进行了研究。在文献中,压缩人类正面面部图像的问题已经得到解决。处理的图像是护照类型的照片,即正面正面,纯背景,无墨镜,无仇恨和其他非标准服装。本文对人脸图像进行了IDL压缩。处理的面部图像是护照类型的照片——正面正面。存储同一个人的三张不同的照片。生成一个代码本并进行压缩。对于不同的块大小,获得了可观的PSNR值。本文介绍了一种压缩和解压缩面部图像的方法,使其在视觉上具有吸引力,质量足以在视觉上正确地识别给定的主题。
{"title":"A Study on Novel Method of Facial Image Compression Using Master Code","authors":"M. Reni Sagayaraj, R. Sathishkumar, S. Anand Gnana Selvam","doi":"10.51983/ajsat-2016.5.2.932","DOIUrl":"https://doi.org/10.51983/ajsat-2016.5.2.932","url":null,"abstract":"In this paper, face images are studied in the context of detection and recognition. In the literature, the problem of compressing human frontal facial images has been addressed. The images that are dealt are passport-type photos namely, full face, frontal view, plain background, no dark glasses, without hates and other non-standard clothing. Compression of Facial Images by using IDL is carried out in this paper. The facial images dealt with are passport-type photos-full face, frontal view. Three different photos of the same person are stored. A single code book is generated and compression is carried out. Appreciable PSNR values are obtained for different block sizes. This paper introduces a method to compress and decompress the facial image, so that it is visually appealing, at a quality sufficient to an un-mistakenly visually identify a given subject.","PeriodicalId":414891,"journal":{"name":"Asian Journal of Science and Applied Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115476173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Asian Journal of Science and Applied Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1