ACTIVE CONTOUR BASED LIVER IMAGE ANALYSIS |
Author : Sajith.A.G, Dr.Hariharan.S |
Abstract | Full Text |
Abstract :Accurate and fast image segmentation algorithm is of paramount importance for a wide range of
medical imaging applications. The most widely used image segmentation algorithms are region based
and typically rely on the homogeneity of the image intensities in the regions of interest, which often
fail to provide accurate segmentation results. This paper addresses the application of active contours
for robust tracking of contours. In this method motion estimation is embedded in the energy
minimization process of the contours. This is possible using a dynamic programming approach for
this minimization problem. This method has been successfully applied to the analysis of liver images. |
|
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS |
Author : S.Naveen Kumar, A.Mohammed Arif, S.Naveen Kumar, Mr.S.VijayMurugan,M.E |
Abstract | Full Text |
Abstract :The growth in electronic transactions at ATM has been increasing and so there is demand for fast and
accurate user identification and authentication. Generally user has to provide two means of
identification, one of which is a physical token, such as card and other of which is something memorized
constant code. This work aims at improvising the security and authenticity of ATM. Instead of memorized
code here in this work we generate random OTP (One Time Password) which is sent to mobile through
GSM model and RF-ID reader to receive the user information. At the time of wrong input code (3 times)
we would transmit video to control station via camera, as there would be more monitors to display it is
made as in this way that if the person is trying any defaulting it would switch on monitor which need
authentication and also when ATM machine is disturbed. |
|
A REVIEW ON ENHANCING DATA SECURITY IN CLOUD COMPUTING USING RSA AND AES ALGORITHMS |
Author : Dr.S.Gunasekaran, M.P.Lavanya |
Abstract | Full Text |
Abstract :Cloud computing is a new computational paradigm that offers an innovative business model for an
organization to adopt IT without upfront investments. It provides enormous storage for data and computing to
customers over the internet. Cloud Computing gained great responsiveness from the industry but still there are
many issues that are hampering the growth of the cloud. Security of data in cloud is one of the major issue which
is more complication in the implementation of cloud computing. These security issues are avoided by various
encryption algorithms. This work presents a review on various encryption algorithms to enhance the data
security in cloud computing. |
|
DE-NOISING RADIOGRAPHIC IMAGES USING BILATERAL EDGE PRESERVING FILTER |
Author : S.Hari Krishna , .Sushendra, Dr.P.Chitra |
Abstract | Full Text |
Abstract :An improved radiographic image denoising using bilateral filtering and edge preserving by snake
method. In digital radiographic input image contain noise and denoise by using bilateral filter. It is a
non-linear, and noise reduction smoothening filter. Intensity value at each image pixel is replaced by
average of intensity values from nearby pixels. For detecting edges in radiographic images,
discontinuous contours can be obtained in traditional approach, due to attenuation of sound wave and
speckle noise. Developing snake edge detection. |
|
DESIGNING A CUSTOM OS FOR IOT USING YOCTO PROJECT AND CREATING IOT APPS USING IBM BLUEMIX |
Author : Subravelu.T, Ruhan Bevi.A |
Abstract | Full Text |
Abstract :Developers spend lot of time porting or making build systems which leaves less time and resources to
develop value adding software features this can resolved by the Yocto Project. The Yocto Project
combines the convenience of a ready-to-run Linux Distribution with the flexibility of a custom Linux
operating system. The Yocto Project is not an Embedded Linux Distribution. It creates a custom one for
us, it is an Ecosystem. The Yocto Project used to establish a custom Linux baseline across multiple
hardware configurations. This allows software developers to write software for an embedded Internet
of Things (IoT) device. The IoT is expected to offer an unprecedented connectivity of all the things
including but not limited to devices, systems and services. This interconnection can creates a platform
to automate and connect for almost all the fields and industry. However, Low cost computing platforms
could be used which specialize in doing only one thing and also consume less power. Yocto project
used to build a free custom OS which will support Internet of Things in Beaglebone black as low cost
computing platform. |
|
SECURE LOCATION SHARING IN PERVASIVE ENVIRONMENTS |
Author : S.Kumararaja, N.Sowriraja Pillai |
Abstract | Full Text |
Abstract :In a modern data sharing society most of the people depends some additional mechanisms to share their
resources with the help of devices. The mobile phones play a vital role in it. These Mobile devices contains
lot and lots of applications to provide services to users, location based services is including in the scenario.
But the question arises to everybody’s mind that the sharing resource is how much secure? For answering
these questions each and everyone depends on the third party provider devices or regular service providers.
But many of the people (may be individual or group) do not want to reveal their location based information
to service providers or third party vendors, because of maintaining their privacy. A new technique is
introduced to provide service between source and destination persons to share the optimal meeting point
locations safely without any security issues, called PPFRVP (Privacy Preserving Fair Rendoz-Vous Point).
The PPFVRP approach is used to show the possible set of meeting point locations (n-Locations) between
source and destination and allow the user to fetch the favorable one. The Secure Hash Algorithm is used by
the source end for cipher process and shares the Meeting point locations to destination. For all the quoted
rules of FVRP and SHA provides an efficient result to share the optimal meeting points between source and
destination end. |
|