An interactive Tool for Writer Identification based on Offline Text Dependent Approach
Writer identification is the process of identifying the writer of the document based on their handwriting. The growth of computational engineering, artificial intelligence and pattern recognition fields owes greatly to one of the highly challenged problem of handwriting identification. This paper proposes the computational intelligence technique to develop discriminative model for writer identification based on handwritten documents. Scanned images of handwritten documents are segmented into words and these words are further segmented into characters for word level and character level writer identification. A set of features are extracted from the segmented words and characters. Feature vectors are trained using support vector machine and obtained 94.27% accuracy for word level, 90.10% for character level. An interactive tool has been developed based on the word level writer identification model.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Automatic collaboration and analysis of semantic web information for electronic learning environment
Semantic web technology enables machine to read and process web pages without human intervene. Semantic web information will no longer only be intended for human readers, but also for processing by machines, enabling intelligent information services, personalized web sites, and semantically empowered search-engines. The web has become a major vehicle in performing research and education related activities for researches and students. With increasing student mobility and boom of the international student exchange programmes, a need arises for unifying and presenting information about academic study programmes on the Web. Publishing study programmes using semantic web technologies enables students to easily search and select study topic of their interest. In this paper we present an enterprise semantic framework for e-Learning system which improved the quality of web mining results but also enhanced the functions, services and the interoperability of e-Learning system. The system helps to find suitable semantic data related to students, faculties and courses for the clients. We have implemented semantic web mining in parallel distributed environment in all tiers for decision making, and also increased speed and efficiency of information retrieval.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Fuzzy Logic Tool for Imprecise Information in Wireless Communication-Another Perspective
With the advancement in wireless communication technology, various networks exists simultaneously. The variation in wireless network parameters is imprecise in nature. To handle this imprecise data fuzzy logic can be used as an important tool for wireless network algorithms. Application of fuzzy logic/fuzzy controller in wireless communications is presented in this paper. The objective of this paper is to highlight the importance of use of fuzzy logic based algorithms in heterogeneous wireless environment. This paper will focus on application of fuzzy logic in cognitive radio, wireless sensor networks, decision making in heterogeneous wireless environment, routing in mobile Ad-hoc networks etc.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A study of MPEG series
The applications of audio and video compression are limitless and the ISO has done well to provide standards which are appropriate to the wide range of possible compression products. MPEG coding embraces video pictures from the tiny screen of a videophone to the high-definition images needed for electronic cinema. Audio coding stretches from speech-grade mono to multichannel surround sound. This paper presents an overview of the video compression standards related to the MPEG family. MPEG-7 and MPEG-21 are specially covered including its latest standards. MPEG-7 is mainly used for object descriptions and MPEG-21 is for DRM (Digital Rights Management).
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Artificial neural networks bidirectional associative memory
This paper focuses on the bidirectional associative memory its features and the future aspects and the current context of application. BAM is a type of neural network. Artificial neural network (Ann’s) resembled the human nervous system, with algorithms consisting of weighted interconnecting processing units (like neural map of the human brain). To address a particular problem using Ann’s, the interrelated connections are tuned and the value of weights between units is needed. Neural network is a new unexplored topic of interest for the computer scientists. Bam comes under recurrent types of network called Hopfield network. BAM is a resonance model, in the sense that information is passed back and forth between two layers of units until a stable sate is reached. The Hopfield network is said to be auto associative, because it uses a partial and noisy pattern to recall the best match of itself. BAM includes: ASSOCIATIVE NEURAL MEMORIES: Associative neural memories are a class of artificial neural networks (connectionist nets) which have gained substantial attention relative to other neural net paradigms. Associative memories have been the subject of research. NOISE TOLERANCY: This paper analyzes the sensitivity to noise in BAM (Bidirectional Associative Memory), and then proves the noise immunity of BAM relates not only to the minimum absolute value of net inputs (MAV) but also to the variance of weights associated with synapse connections.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Satellite imagery cadastral features segmentation using canny and morphological methods for a sustainable cadastral science
Satellite images are used to extract linear features, like roads, etc. The extraction of linear features or boundaries defining the extents of lands, land covers features are important in Cadastral Surveying. Cadastral Surveying is the cornerstone of any Cadastral System. A two dimensional cadastral plan is a model which represents both the cadastral and geometrical information of a two dimensional labeled Image. This paper aims at using a combination of canny and morphological operations for extracting representations of cadastral boundaries from high resolution Satellite imagery hence minimizing the human interventions. The Satellite imagery is initially rectified hence establishing the satellite imagery in the correct orientation and spatial location for further analysis. We, then employ the much available Satellite imagery to segment the relevant cadastral features using the above mentioned methods. We evaluate the potential of using high resolution Satellite imagery to achieve Cadastral goals of boundary detection and extraction of farmlands using image processing algorithms. This method proves effective as it minimizes the human demerits hence providing another perspective of achieving cadastral goals as emphasized by the UN cadastral vision for an improved socio economic development.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An Automation Software for ECR Experiment at Cryogenics Temperatures
Low temperature offers an exciting opportunity to understand physical properties of various material and process. Electrical contact resistance which is fairly understood at room temperature behaves in entirely difference way at temperatures below the room temperature. Estimation of contact resistance and its behavior at low temperatures is not only necessary for its application areas but for understanding the contact mechanism and controlling the contact resistance. Low temperature experiments are highly time-consuming, due to the inherent thermal design of these systems, which takes a lot of time to stabilize. Automation of these experiments not only eases the experimentation but also improve the result accuracy.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Analysis and evaluating of quality of Tehran university cohesive training systems
The aim of present research is to determine and prioritize criteria and scales of evaluating cohesive training systems. Present paper attempts to provide a paradigm for better devising of universities' cohesive training systems by identifying such scales. In terms of its aim, this research is an applied one and in terms of data collection method, it is descriptive and survey one. Its population includes elite training experts in the colleges and institutes affiliated to University of Tehran. It attempts to study domestic and foreign papers and to identify criteria and scales for evaluating cohesive training systems. Library method is used to gather information on theoretical basics, literature and to identify aspects and scales. Identified aspects include: content, flexibility, organizational structure, usage convenience, usage services and apparent form. By using the experts opinions, importance ratio of each one of scales and aspects is determined. Also for evaluating the status of this scales in golestan system of Tehran university a questionnaire is compiled. that its admissibility and permanence is confirmed. Then the questionnaire in a sample (of our case) is distributed. In data analysis, T-test: statistical test is used to examine the status of scales and aspects. The results of this test indicated that the organizational structure scales and usage convenience have middle status, the status of flexibility, usage services and apparent form is undesirable, and the content have a desirable status.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Phishing attack Generalization
Most of the attacks on web application occurs by hits and trial methods, analysis of previous methods, misguiding users etc. User’s are intelligent but could see only, that, which are visible. Internal configuration or working are hidden by the user, even by designer also, because web application has to cross various platforms, architectures and layers each having their own pattern or procedure, various web attacking classe are acting on web ,out of which phishing attack class has been discussed and which is the most threatening way to misguide user, Here Phishing attack has been discussed from where attacker generates exact replica of original site to get username and password.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Random pattern based flexible user interface for an effective secured authentication protocol
The development and maintenance of user interface software is surely a challenging task. Organizations who use secured authentication system tolerate no leakage. Cryptographic primitives are useful tools but security of these primitives does not guarantee security of the system. Using patterns for authentication is a system that provides patterns as passwords to the users. Users tend to choose their passwords through random art generation which can be captured by malicious users by video capturing or photo clicking. In lieu of the traditional password based system, several attempts had been reported in literature about authentication schemes which are successful in increasing the strength of the system against some of the known attacks. In this paper, Random Pattern based Flexible User Interface for an effective Secured Authentication Protocol (SAP-RP) is presented. With iterations of random patterns, the users enter different passwords (which are based on the original images selected by them) for every login attempt that is converted to hashed value. It is compared with registered hashed value stored in the database which ensures confidentiality and authentication in the network plane using server and flexible user interface based authentication mechanism.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]