This document discusses a survey on multimodal biometric authentication systems in cloud computing. It begins with introducing the authors and purpose of studying multimodal biometrics. It then discusses how combining multiple biometric modalities can improve authentication by reducing errors. The document reviews different biometric traits like fingerprints, iris scans, and behavioral patterns. It also covers challenges of single biometric systems and how fusing modalities can help. The goal is to provide more secure authentication as a cloud service using multimodal biometrics.
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Feature Level Fusion of Multibiometric Cryptosystem in Distributed SystemIJMER
ABSTRACT: Multibiometrics is the combination of one or more biometrics (e.g., Fingerprint, Iris, and Face). Researchers
are focusing on how to provide security to the system, the template which was generated from the biometric need to be
protected. The problems of unimodal biometrics are solved by multibiometrics. The main objective is to provide a security to
the biometric template by generating a secure sketch by making use of multibiometric cryptosystem and which is stored in a
database. Once the biometric template is stolen it becomes a serious issue for the security of the system and also for user
privacy. In the existing approach, feature level fusion is used to combine the features securely with well-known biometric
cryptosystems namely fuzzy vault and fuzzy commitment. The drawbacks of existing system include accuracy of the biometric
need to be improved and the noises in the biometrics also need to be reduced. The proposed work is to enhance the security
using multibiometric cryptosystem in distributed system applications like e-commerce transactions, e-banking and ATM.
Keywords: Biometric Cryptosystem, Error correcting code, Fingerprint, Iris, Multibiometrics, Unimodal biometrics.
Robust Analysis of Multibiometric Fusion Versus Ensemble Learning Schemes: A ...CSCJournals
Identification of person using multiple biometric is very common approach used in existing user
validation of systems. Most of multibiometric system depends on fusion schemes, as much of the
fusion techniques have shown promising results in literature, due to the fact of combining multiple
biometric modalities with suitable fusion schemes. However, similar type of practices are found in
ensemble of classifiers, which increases the classification accuracy while combining different
types of classifiers. In this paper, we have evaluated comparative study of traditional fusion
methods like feature level and score level fusion with the well-known ensemble methods such as
bagging and boosting. Precisely, for our frame work experimentations, we have fused face and
palmprint modalities and we have employed probability model - Naive Bayes (NB), neural
network model - Multi Layer Perceptron (MLP), supervised machine learning algorithm - Support
Vector Machine (SVM) classifiers for our experimentation. Nevertheless, machine learning
ensemble approaches namely, Boosting and Bagging are statistically well recognized. From
experimental results, in biometric fusion the traditional method, score level fusion is highly
recommended strategy than ensemble learning techniques.
The Survey of Architecture of Multi-Modal (Fingerprint and Iris Recognition) ...IJERA Editor
Biometrics based individual identification is observed as an effective technique for automatically knowing, with a high confidence a person’s identity. Multi-modal biometric systems consolidate the evidence accessible by multiple biometric sources and normally better recognition performance associate to system based on a single biometric modality.Multi biometric systems are used to overcome this issue by providing multiple pieces of indication of the same identity. This system provides effective fusion structure that combines information provided by the multiple field experts based on decision-level and score-level fusion method, thereby increasing the efficiency which is not conceivable in uni-modal system.Multi-modal biometrics can be attained through a fusion of two or more images, where the subsequent fused image will be more protected. This paper discusses various fusion techniques, architecture of multi-modal biometric authentication and working of biometric fusion i.e. Iris and Fingerprint recognition that are used in multi-modal biometrics
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
Multimodal biometric systems are those that utilize more than one physical or behavioural characteristic for enrolment , verification, or identification.
Performance Enhancement Of Multimodal Biometrics Using CryptosystemIJERA Editor
Multimodal biometrics means the unification of two or more uni modal biometrics so as to make the system more reliable and secure. Such systems promise better security. This study is a blend of iris and fingerprint recognition technique and their fusion at feature level. Our work comprises of two main sections: feature extraction of both modalities and fusing them before matching and finally application of an encryption technique to enhance the security of the fused template.
User verification systems that use a single source of biometric information are not sufficient to meet today’s high security requirements for applications. This is because these systems have to contend with noisy data, intra-class variations, spoof attack and non-universality. Therefore, there is need for employing multiple sources of biometric information to provide better recognition performance as compared to the systems based on single trait. This paper is an overview of different categories of multibiometric systems, information fusion in multibiometric systems, and approaches to feature fusion at feature selection phase.
Bimodal Biometric System using Multiple Transformation Features of Fingerprin...IDES Editor
The biometric technology is used to identify
individuals effectively compared to existing traditional
methods. In this paper we propose Bimodal Biometric System
using Multiple Transformation features of Fingerprint and
Iris (BBMFI). The iris image is preprocessed to generate iris
template. The two level Discrete Wavelet Transformation
(DWT) is applied on iris template and Discrete Cosine
Transformation (DCT) is performed on second level low
frequency band to generate DCT coefficients which results in
features of iris. The fingerprint is preprocessed to obtain
Region of Interest (ROI) and segmented into four cells. Then
the DWT is applied on each cell to derive approximation band
and detailed bands. The Fast Fourier Transformation (FFT)
is applied on approximation band to compute absolute values
that results in features of fingerprint. The iris features and
fingerprint features are fused by concatenation to obtain final
set of features. The final feature vector of test and database
are compared using Euclidean distance matching. It is observed
that the values of Total Success Rate (TSR), False Rejection
Rate (FRR) and False Acceptance Rate (FAR) are improved in
the proposed system compared to existing algorithm.
Paper multi-modal biometric system using fingerprint , face and speechAalaa Khattab
Biometric system is often not able to meet the desired performance requirements.
In order to enable a biometric system to operate effectively in different applications and environments, a multimodal biometric system is preferred.
In this paper introduce a multimodal biometric system which integrates fingerprint verification , face recognition and speaker verification.
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Integrating Fusion levels for Biometric Authentication SystemIOSRJECE
— Recently a lot of works are presented in the literature for the multimodal biometric authentication. And such biometric systems have been widely accepted with increasing accuracy rates and population coverage, reducing the vulnerability to spoofing. This paper descripts about the proposed multimodal biometric system that combines the feature extraction level and the score level fusion of iris and face unimodal biometric systems in order to take advantage of both fusion techniques. The experimental results shows the performance of the multimodal and multilevel fusion techniques which are analysed using TRR and TAR to study the recognition behaviour of the approach system. From the ROC Curve plotted, the performance of the proposed system is better compared to the individual fusion techniques.
An SVM based Statistical Image Quality Assessment for Fake Biometric DetectionIJTET Journal
Abstract
A biometric system is a computer based system and is used to identify the person on their behavioral and logical characteristics such as (for example fingerprint, face, iris, keystroke, signature, voice, etc.).A typical biometric system consists of feature extraction and matching patterns. But nowadays biometric systems are attacked by using fake biometric samples. This paper described the fingerprint biometric techniques and also introduce the attack on that system and by using Image Quality Assessment for Liveness Detection to know how to protect the system from fake biometrics and also how the multi biometric system is more secure than uni-biometric system. Support Vector Machine (SVM) classification technique is used for training and testing the fingerprint images. The testing onput fingerprint image is resulted as real and fake fingerprint image by quality score matching with the training based real and fake fingerprint samples.
Biometric Template Protection With Robust Semi – Blind Watermarking Using Ima...CSCJournals
This paper addresses a biometric watermarking technology sturdy towards image manipulations, like JPEG compression, image filtering, and additive noise. Application scenarios include information transmission between client and server, maintaining e-database and management of signatures through insecure distribution channels. Steps involved in this work are, a) generation of binary signature code for biometric, b) embedding of the binary signature to the host image using intrinsic local property, that ensures signature protection, c) host image is then made exposed to various attacks and d) signature is extracted and matched based on an empirical threshold to verify the robustness of proposed embedding method. Embedding relies on binary signature manipulating the lower order AC coefficients of Discrete Cosine Transformed sub-blocks of host image. In the prediction phase, DC values of the nearest neighbor DCT blocks is utilized to predict the AC coefficients of centre block. Surrounding DC values of a DCT blocks are adaptively weighed for AC coefficients prediction. Linear programming is used to calculate the weights with respect to the image content. Multiple times embedding of watermark ensures robustness against common signal processing operations (filtering, enhancement, rescaling etc.) and various attacks. The proposed algorithm is tested for 50 different types of host images and public data collection, DB3, FVC2002. FAR and FRR are compared with other methods to show the improvement.
Personal identification using multibiometrics score level fusioneSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Multimodal Biometrics at Feature Level Fusion using Texture FeaturesCSCJournals
In recent years, fusion of multiple biometric modalities for personal authentication has received considerable attention. This paper presents a feature level fusion algorithm based on texture features. The system combines fingerprint, face and off-line signature. Texture features are extracted from Curvelet transform. The Curvelet feature dimension is selected based on d-prime number. The increase in feature dimension is reduced by using template averaging, moment features and by Principal component analysis (PCA). The algorithm is tested on in-house multimodal database comprising of 3000 samples and Chimeric databases. Identification performance of the system is evaluated using SVM classifier. A maximum GAR of 97.15% is achieved with Curvelet-PCA features.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Information Security using Cryptography and Image Processingijsrd.com
Meaning of Information security is protecting information and the systems from unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction. Therefore it is necessary to apply effective encryption/decryption methods to achieve data security. The user only needs to remember the short password to retrieve the key. The password can be forgotten and stolen. As Biometrics based authentication systems confirm an individual's identity based on the physiological and/or behavioral characteristics of the individual. It has advantages over password based methods. Biometrics based method provides direct link between the service and actual user. With biometrics, there is nothing to lose or forget, and it is relatively difficult to manipulate. Biometrics and cryptography are the two most prominent solutions for user authentication, data integrity preservation, and trustworthy verification. By combining biometrics with cryptography, high level of security can be achieved.
A USER PROFILE BASED ACCESS CONTROL MODEL AND ARCHITECTUREIJCNC
Personalization and adaptation to the user profile capability are the hottest issues to ensure ambient
assisted living and context awareness in nowadays environments. With the growing healthcare and
wellbeing context aware applications, modeling security policies becomes an important issue in the
design of future access control models. This requires rich semantics using ontology modeling for the
management of services provided to dependant people. However, current access control models remain
unsuitable due to lack of personalization, adaptability and smartness to the handicap situation.
In an organization specifically as virtual as cloud there is need for access control systems to constrain
users direct or backhanded action that could lead to breach of security. In cloud, apart from owner access
to confidential data the third party auditing and accounting is done which could stir up further data leaks.
To control such data leaks and integrity, in past several security policies based on role, identity and user
attributes were proposed and found ineffective since they depend on static policies which do not monitor
data access and its origin. Provenance on the other hand tracks data usage and its origin which proves the
authenticity of data. To employ provenance in a real time system like cloud, the service provider needs to
store metadata on the subject of data alteration which is universally called as the Provenance Information.
This paper presents a provenance-policy based access control model which is designed and integrated with
the system that not only makes data auditable but also incorporates accountability for data alteration
events.
SECURE CLOUD COMPUTING MECHANISM FOR ENHANCING: MTBACijistjournal
The development of the cloud system,A large number of vendors can visit their users in the same platform directing their focus on the software rather than the underlying framework. This necessary require the distribution, storage analysis of the data on cloud accessing virtualized and scalable web services with broad application of cloud, the data security and access control become a major concern. The access to the cloud requires authorization as well as data accessibility permission. The verification and updation of data accessibility permissions and data must be done with proper knowledge which requires identification of correct updates and block listed users who are intruder to cloud Introducing the false data system. In this paper we approach to builds a mutual trust relationship between users and cloud for accessing control method in cloud computing environment focusing on the system integrity and its security. The proposed approach is executed as a procedure manner and includes many steps to identify the user’s credibility in the cloud network.
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
"In any organization it is an essential task to protect the data from unauthorized users. Information Systems hardware, software, networks, and data resources need to be protected and secured to ensure quality, performance, and integrity. Security management deals with the accuracy, integrity, and safety of information resources. When effective security measures are in place, they can reduce errors, fraud, and losses. In the current work, the authors have proposed a model for encryption of a text phrase employing genetic algorithm. The entropy inherently available in genetic algorithm is exploited for introducing chaos in a text phrase thereby rendering it unreadable. The no of cross over points and mutation points decides the strength of the algorithm. The prototype of the model is implemented for testing the operational feasibility of the model and the few test cases are presented Dr. Poornima G. Naik | Mr. Pandurang M. More | Dr. Girish R. Naik ""A Model for Encryption of a Text Phrase using Genetic Algorithm"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Fostering Innovation, Integration and Inclusion Through Interdisciplinary Practices in Management , March 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23063.pdf
Paper URL: https://www.ijtsrd.com/computer-science/data-processing/23063/a-model-for-encryption-of-a-text-phrase-using-genetic-algorithm/dr-poornima-g-naik"
A trust based secure access control using authentication mechanism for intero...IJECEIAES
The internet of things (IoT) is a revolutionary innovation in many aspects of our society including interactions, financial activity, and global security such as the military and battlefield internet. Due to the limited energy and processing capacity of network devices, security, energy consumption, compatibility, and device heterogeneity are the long-term IoT problems. As a result, energy and security are critical for data transmission across edge and IoT networks. Existing IoT interoperability techniques need more computation time, have unreliable authentication mechanisms that break easily, lose data easily, and have low confidentiality. In this paper, a key agreement protocol-based authentication mechanism for IoT devices is offered as a solution to this issue. This system makes use of information exchange, which must be secured to prevent access by unauthorized users. Using a compact contiki/cooja simulator, the performance and design of the suggested framework are validated. The simulation findings are evaluated based on detection of malicious nodes after 60 minutes of simulation. The suggested trust method, which is based on privacy access control, reduced packet loss ratio to 0.32%, consumed 0.39% power, and had the greatest average residual energy of 0.99 mJoules at 10 nodes.
A novel graphical password approach for accessing cloud & data verificationeSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
CLOUD BASED ACCESS CONTROL MODEL FOR SELECTIVE ENCRYPTION OF DOCUMENTS WITH T...IJNSA Journal
Cloud computing refers to a type of networked computing whereby an application can be run on connected
servers instead of local servers. Cloud can be used to store data, share resources and also to provide
services. Technically, there is very little difference between public and private cloud architecture. However,
the security and privacy of the data is a very big issue when sensitive data is being entrusted to third party
cloud service providers. Thus encryption with a fine grained access control is inevitable to enforce security
in clouds. Several techniques implementing attribute based encryption for fine grained access control have
been proposed. Under such approaches, the key management overhead is a little bit high in terms of
computational complexity. Also, secret sharing mechanisms have added complexity. Moreover, they lack
mechanisms to handle existence of traitors. Our proposed approach addresses these requirements and
reduces the overhead of the key management as well as secret sharing by using efficient algorithms and
protocols. Also, a traitor tracing technique is introduced into the cloud computing two layer encryption
environment.
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
The ability to track and trace assets in the supply chain is becoming increasingly important. In addition to asset tracking, the technologies used provide new opportunities for collecting and analyzing employee position and biometric data. As a result, these technologies can be used to monitor performance or track worker behavior, resulting in additional risks and stress for employees. Furthermore, contact tracing systems used to contain the COVID-19 outbreak have made positive patients' privacy public, resulting in violations of users' rights and even endangering their lives. To resolve this situation, a verifiable attribute-based encryption (ABE) scheme based on homomorphic encryption and zero-knowledge identification (ZKI) is proposed, with ZKI providing anonymity for data owners to resist tracking attacks and homomorphic encryption used to solve the problem of privacy leakage from location inquiries returned from a semi-honest server. Finally, theoretical security analysis and formal security verification show that our scheme is secure against the chosen plaintext attack (CPA) and other attacks. Besides that, our novel scheme is efficient enough in terms of user-side computation overhead for practical applications.
A Privacy-Aware Tracking and Tracing SystemIJCNCJournal
The ability to track and trace assets in the supply chain is becoming increasingly important. In addition to asset tracking, the technologies used provide new opportunities for collecting and analyzing employee position and biometric data. As a result, these technologies can be used to monitor performance or track worker behavior, resulting in additional risks and stress for employees. Furthermore, contact tracing systems used to contain the COVID-19 outbreak have made positive patients' privacy public, resulting in violations of users' rights and even endangering their lives. To resolve this situation, a verifiable attribute-based encryption (ABE) scheme based on homomorphic encryption and zero-knowledge identification (ZKI) is proposed, with ZKI providing anonymity for data owners to resist tracking attacks and homomorphic encryption used to solve the problem of privacy leakage from location inquiries returned from a semi-honest server. Finally, theoretical security analysis and formal security verification show that our scheme is secure against the chosen plaintext attack (CPA) and other attacks. Besides that, our novel scheme is efficient enough in terms of user-side computation overhead for practical applications.
Similar to A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING (20)
Patient compliance: Challenges in management of cardiac diseases in Kuala Lum...pharmaindexing
Background
The objective of this study was to investigate the degree of compliance among cardiac patients who attend the health facilities in Kuala Lumpur and Perak, Malaysia. The reasons for non-compliance and recommendations from healthcare professionals were also evaluated.
Method
A cross-sectional study of 400 patients and 100 healthcare professionals was carried out. This study utilizes variables on external factors and internal factors as the measurement tools. The questionnaire which consists of Morisky self-reported medication adherence questions was administered to patients and causes for non-compliance sought. Questionnaire for healthcare professionals was used to determine strategies that can improve compliance rate.
Results
The study revealed a 15.8% of high adherence rate, 54.3% of moderate adherence rate and 30% of poor adherence to cardiovascular disease medications. The chi-square tests showed the strong association between dependent and independent variables. The model chosen for testing the patient compliance through external and internal factors gives an R2 value of 85.0% with an adjusted R2 of 84.7%. The F value (317.187) was also significant (p=0.000) which means that the variables have better fit in the multivariate model. The major reasons determined for non-adherence were attitudes and beliefs, lifestyle, side effects and cost of medications. The study recommends that pharmacists and dispensing technicians should be adequately qualified to provide proper counselling to cardiac patients on their medicines and disease conditions.
Conclusion
The result of this study is of value to health care providers. Compliance to cardiovascular medications will avoid treatment failures encountered in therapy.
Overview on Recurrence Pregnancy Loss etiology and risk factorspharmaindexing
Recurrent pregnancy loss (RPL) can be defined as more than two to three consecutive miscarriages before 20 weeks’ gestation; it affects approximately 1% to 2% of women. RPL is a multifactorial disease. It is very important to study the etiology and risk factors of RPL to find the best diagnostic tests and suitable therapeutic intervention. This article will discuss the current understanding etiologies and risk factors of RPL.
Novel treatments for asthma: Corticosteroids and other anti-inflammatory agents.pharmaindexing
Asthma management is a challenge due to the prevalence of disease in the world. Based on the immunological and inflammatory mechanisms of asthma, corticosteroids and anti-inflammatory participate greatly in the treatment plan. Due to different reasons, there is still an unmet need to develop new agents in this field. A lot of compounds with anti-inflammatory effect are investigated in both pre-clinical and clinical studies.
A review on liver disorders and screening models of hepatoprotective agentspharmaindexing
The liver is a vital organ present in vertebrates and some other animals. It has a wide range of functions, including detoxification, protein synthesis, and production of bio chemicals necessary for digestion. The liver is necessary for survival; there is currently no way to compensate for the absence of liver function long term, although liver dialysis can be used short term.
Carbamazepine induced Steven Johnson syndrome: A case reportpharmaindexing
Drugs are the most common cause that induces Steven Johnson syndrome (SJS) and includes antiepileptic drugs, antiretroviral drugs, anti-tuberculosis drugs, Sulphonamides, fluoroquinolones, penicillins, non-Steroidal anti-inflammatory drugs, Multivitamins. The genetic markers are also the cause for carbamazepine induced Steven Johnson Syndrome. In our study, the antiepileptic drug (Carbamazepine) is the cause for Steven Johnson Syndrome. A female patient aged 25 years came to the hospital with the complaints of bubbling over the skin and all over the body with papillary vesicles associated with pain and irritation, fever, myalgia, and nausea. The patient is known case of Phenytoin induced Steven Johnson Syndrome. In this case the patient developed the Steven Johnson Syndrome approximately after one month after starting the carbamazepine.By the withdrawal of the drug, the condition of the patient was improved.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Monoherbal formulation development for laxative activitypharmaindexing
The Ayurvedic Pharmacopoeia specifically approves flaxseed as a poultice for boils externally and demulcent or laxative internally. In this study monoherbal formulation development for laxative activity of flaxseed was undertaken. The plantLinumusitatissimumhasshowed higher percentage of total ash as well as alcohol soluble extractive values. The aqueous extract of Linumusitatissimumwas prepared by using pilot scale extraction plant and spray drying unit. The qualitative phytochemical studies reveal the presence of amino acids, carbohydrates, vitamins and proteins. From the available literatures it was found that Linumusitatissimum contains more number of amino acids. The formulated tablets showed acceptable pharmacopoeial limits and complies with specifications for thickness, hardness, friability and weight variation. The formulation has showed better laxative activity indicating additive property of the combined phytoconstituents of the plant.
Pneumonia and respiratory failure from swine origin influenza H1n1pharmaindexing
Swine influenza (swine flu) became alarming health concern when World Health Organization declared as “public health emergency of international concern” on April 25, 2009. After documentation of human-to-human transmission of the virus in at least three countries of two WHO regions, the WHO raised the pandemic level to 6.1 During the 1918, flu pandemic infected one-third of the world's population (an estimated 500 million people) and caused approximately 50 million deaths.2 In 1976, an outbreak of swine influenza occurred in New Jersey, USA, which involved more than 200 cases, some of them severe, resulting in one death.3 In 1988, another fatality was reported as a complication of swine influenza.
A descriptive study on newborn care among postnatal mothers in selected mater...pharmaindexing
The newborn health challenge faced by India is more formidable than that experienced by any other country in the world. The newborn health is inevitably affected by the traditional care practices of the mothers causing high infant morbidity and mortality.The aim of the study were determine the knowledge, attitude and practice of postnatal mothers regarding new born care and find out the association between knowledge, attitude and practice of postnatal mothers regarding new born care and to determine the association between these as well as with the selected demographic variables. A descriptive study was conducted to assess the knowledge, attitude and practice of postnatal mothers regarding new born care in selected maternity centres in Madurai. Survey approach was employed to select sample and it consisted of 100 postnatal mothers. Data was collected using structured interview schedule. Findings of the study showed that 65% of postnatal mothers had moderate knowledge; 61% had favourable attitude and 57% of them had high practice of new born care. There was a significant association between knowledge and attitude (r=+0.567), knowledge and practice (r=+0.388), attitude and practice (r=+0.321) .There was a significant association between knowledge and education, monthly family income and obstetrical score at p<0.05. Findings of the study indicated the need to conduct frequent assessment of knowledge, attitude and practice of postnatal mothers regarding new born care. Awareness and attitude of the mothers towards new born care still has lots of lacunae especially in those who belong to the lower socio economic statusand poorly educated postnatal mothers. So it is imperative to provide comprehensive training in the field of new born care for mothers during pregnancy
Late 19th century was evident of intelligent biomaterial; which has changed researcher’s perspective towards science and technology. This intelligent biomaterial are envisioned to have huge impact on Healthcare from sequential signalling of biomedical molecule, mimicking natural gene, an effective drug carrier, to high resolution diagnostic tool.From drug discovery aspect many of NCE fail to reach therapeutic potential due to PK/ PD profile. Nanotechnology has changed the face of drug discovery form chemical evaluation to structure of proteins in signalling pathways and development of chemical antibody. Nanotechnology from lab to market approval is long process due to regulatory evaluation. Though it seems to be bright future market it has to go through a long process from being innovation to complete market product. This makes whole process expensive making investor reluctant to invest in big projects.Western world is aware of dramatic potential of nano-projects; which has its limitation in financial investments; with major challenge of transforming nano science to commercial pharmaceutical product.
The Flaws in health practice in post-operative management of a patient in ter...pharmaindexing
Introduction
Congenital urinary tract obstructions are common cause of kidney damage sometimes which sometimes presents itself without symptoms leading to abnormalities in blood filtration and consequently retarded kidney function. A cohort study was conducted in such patient to find out the short comings in treatment strategy.
Case presentation
A four years old child, weighing 14 kg was brought with severe constipation, fever, chest congestion and cough later developed left eye disorientation after admission to hospital, diagnosed with urinary tract obstruction, indicating acidosis and loss of electrolytes due to excessive loss of water. His therapy management included surgical treatment, dialysis and to improve his electrolyte levels within the normal with the treatment chest congestion and fever.
Conclusion
This case study reports the post operative treatment of congenital urinary tract obstructions in a tertiary care hospital and highlights the discrepancies observed. Antibiotic rationality and irrational prescribing was observed. The case study highlights the need of a clinical pharmacist in the health care team.
Corticosteroid induced disorders – An overviewpharmaindexing
Glucocorticoids are important in the treatment of many inflammatory, allergic, immunologic, and malignant disorders, and the toxicity of glucocorticoids is one of the commonest causes of iatrogenic illness associated with chronic inflammatory disease.Glucocorticoid-induced muscle atrophy is characterized by fast-twitch or type II muscle fiber atrophy. Corticosteroid (CS) therapy is widely used in the treatment of rheumatic diseases.Osteoporosis remains one of its major complications.Steroid induced glaucoma is a form of open angle glaucoma occurring as an adverse effect of corticosteroid therapy. Glucocorticoids induce hepatic and extrahepatic insulin resistance.Glucocorticoid treatment impairs both glucose transport in fat and muscle cells. Corticosteroid-induced psychosis represents a spectrum of psychological changes that can occur at any time during treatment. Cushing’s syndrome describes the signs and symptoms associated with prolonged exposure to inappropriately high levels of the hormone cortisol. Physicians must be aware of these adverse effects and be equipped to manage them.
Anti-inflammatory activity of pupalia lappacea L. Jusspharmaindexing
Pupalia lappacea (L) Juss is an erect shrub used in folklore medicine to treat bone fractures and in inflammatory conditions. Methanolic extract of aerial parts shown is claimed in traditional medicine that the leaves of the plant are used in the treatment of inflammation. In the present study, the methanolic extract of Pupalia lappacea was screened for its anti-inflammatory activity using carageenan induced rat paw edema egg white induced paw oedema models. The methanolic extract at the dose of 200 mg/kg p.o exhibited significant anti-inflammatory activity in carrageenan induced paw edema model (p<0.01). In egg white induced model, methanolic extract at the dose of 200 mg/kg inhibited paw oedema significantly (p<0.01) indicating that both test samples inhibit the increase in number of fibroblasts and synthesis of collagen and mucopolysaccharides during prostaglandin formation during the inflammation. These experimental results have established a pharmacological evidence for the folklore claim of the drug to be used as an anti inflammatory agent. HPTLC analysis of the extract shows the presence of gallic acid 1.24mg/ml, ferulic acid 2.00mg/ml, chlorogenic acid 46.25mg/ml and rutin 7.02mg/ml of the extract which were responsible for the claimed anti-inflammatory action in the animal models studied.
Lucinactant: A new solution in treating neonatal respiratory distress syndrom...pharmaindexing
Lucinactant is a novel synthetic surfactant, approved by the FDA on March 6th 2012, for use in treatment of RDS. It’s superiority as compared to the previously approved surfactants lie in containing sinapultide, a 21-amino acid peptide also known as KL4 peptide, which has been designed to mimic the activity of human surfactant protein. Lucinactant is completely devoid of any animal derived components. It is the fifth drug approved by the FDA for the treatment of RDS. It has shown immense efficacy in phase two clinical trials and animal model studies and exhibited better efficiency when compared to other surfactants in both 24 hour and two week mortality rates of infants in RDS. Lucinactant tends reduce the surface tension at the air-liquid interface of alveolar surfaces and allows lungs to function normally. It was observed that the side effects were lesser with Lucinactant when compared with other naturally derived surfactants.
Bioactivity screening of Soil bacteria against human pathogenspharmaindexing
Microorganisms have a profound effect on medical science as they not only infect & cause disease but also produce metabolic products that can cure infections. Soil happens to be a source for a variety of microorganisms. Most of the bacteria, particularly actinomycetes produce biologically active secondary metabolites. Though there are a number of antibiotics available, there is a pressing need for the discovery of new source for antimicrobials against the pathogens due to the development of drug resistance of the pathogenic microorganisms. In addition to, new pathogenic strains are also developing and causing infection to human beings. Bioactive compounds are compounds that are produced by any living organism and are known to exhibit various biological activities both in-vitro & in-vivo. Bioactivity may be antimicrobial, antineoplastic, anticancerous, immunomodulation, antifertility & others. Soil bacteria were isolated by standard technique and by making use of selective media. The isolates were identified and subjected for preliminary screening to look for their ability to produce bioactive materials. A total of 96 strains were isolated from three different soil samples. 14 of them were found to have antibacterial activity against the human pathogens like Staphylococcus aureus, Streptococcus faecalis, E.coli, Klebsiella aerogenes, Proteus vulgaris, Pseudomonas aureginosa and Salmonella typhi by preliminary screening. Further the selected (3) bacteria were grown in the suitable culture media for the production of bioactive metabolites by using rotary shake flask. The active metabolites was isolated by solvent extraction and concentrated by evaporation under reduced pressure. The antimicrobial screening of the active metabolites showed prominent effect against the clinical pathogens under the study.
A study on sigmoid Volvulus presentation and managementpharmaindexing
A study on sigmoid volvulus presentation and management was a 2yr retrospective study done at RMMCH.The diagnosis of sigmoid volvulus was made from a history of large bowel obstruction (constipation, abdominal distension, and abdominal pain), which were often recurrent and plain abdominal radiographs.The morbidity associated isSuperficial wound infection occurred in four patients. All the infected wounds eventually healed with conservative measures. Clinical anastomotic dehiscence was noted in 1 patient for which during relaparotomy proximal colostomy and mucous fistula was done. The mortality associated is shown is there were 9 deaths of which 7 were due to sepsis and 2 were due to comorbid illness. Two out of eight patients for whom a colopexy was done had a recurrent attack of sigmoid volvulus. The duration of hospital stay ranged between 10 and 21 days. Use of sigmoidoscopic detorsion for viable colon should be encouraged. Sigmoidopexy, which is associated with a recurrence rate of 20% in our series of patients, should be used selectively.Hartmann’s procedure is a safe option in sigmoid volvulus with gangrenous bowel. Primary anastomosis in emergency situation can be carried out with morbidity and mortality in patients with viable colon
Evaluation of Preliminary phytochemical on various some medicinal plantspharmaindexing
The present study was carried out to evaluate the physical status and percentage yield of methanolic extract and its fractions of whole plant of Leucas cephalotes, leaves of Hiptage benghalensis and leaves of Kydia calycina were recorded for future references and Preliminary phytochemical screening of MLC, MHB and MKC revealed the presence of carbohydrates, glycosides, saponins, flavonoids, steroidal and phenolic compounds. MLC revealed the presence of all the above mentioned phytoconstituents except saponins and also MKC steroidal compounds. The fractions of MLC, MHB and MKC revealed the presence of glycosides, phenolic compounds, steroids and flavonoids.
Comparision of in vitro antibacterial activity of cefoperazone and levofloxac...pharmaindexing
Cefoperazone (a third generation cephalosporin) has effective in vitro activity against majority of pathogens. Levofloxacin (a flouroquinolone) is one which prescribed more due to its increased antibacterial activity against Gram-positive, Gram-negative, and atypical bacteria. Microbial resistance to antibiotics is now prevalent and poses a serious clinical threat. An attempt has been made to evaluate sensitivity of Cefoperazone and Levofloxacin against Escherichia coli, Staphylococcus aureus, Pseudomonas aeruginosa and Salmonella typhi. A total of 120 isolates were collected from different pathological laboratories and medical centers in Karachi, Pakistan. The above stated clinical isolates were extracted from urine/stool, skin, blood and sputum samples. Results show least resistance of Levofloxacin as compare to Cefoperazone against Escherichia coli (32.5% and 42.5%) and Pseudomonas aeruginosa (36% and 48%) while Staphylococcus aureus is still susceptible towards Cefoperazone and least sensitive to Levofloxacin by showing 26.6% and 50% resistance respectively. Study concluded that the prevalent pathogens are still susceptible towards Levofloxacin and Cefoperazone but the gradual increase in resistance is alarming to the general practice of prescribing antibiotic which require routine evaluation and surveillance to ensure the effectiveness of the antibacterial agents.
Concept of srotas from ayurvedic perspective with special reference to neurologypharmaindexing
Ayurveda is a life science. The researchers of ayurveda could rule out the presence of srotas (channels) spreading throughout the human body. These srotas (channels) are governed by vayu which is using all the srotas (channels) of the body to carry out the functional and physiological activities of the human body without which the human society will not exist. Several synonymous words have been described by the ayurvedicacharyas for srotas. Some are micro and some are macro in structures and they adopt the same colour of the particular dhatus of the body to which it belongs. The aim of the study is to justify that srotas are nothing but innurmerable channels or pathways of the nervous system governed by electric current without which no functional and physiological activities of the human body will develope.
Health promotion survey in overweight and obese students of universities in n...pharmaindexing
Introduction
Overweight and obesity is one of the major health problems in the UK and worldwide. Approximately two-thirds of the population in the UK is either overweight or obese. Overweight and obesity is an important issue that causes distress to most women. Health promotion is the best method to educate overweight and obese women. It is defined as the process enabling people to increase control over and to improve their health by Ottawa Charter for Health Promotion. It is aimed to enhance the well-being of the individuals and their positive attitudes towards prevention of various diseases. In order to make any improvement to the health promotion for overweight and obesity, the risk factors and the opinions from the public should first be identified and addressed.
Methods
Cross-sectional survey design was selected with a questionnaire that consisted of 20 open and close ended questions. A sample size of 196 was determined. The data thus gathered was analyzed using SPSS V20 (Statistical Package for Social Science version 20). Descriptive statistics (fx) and (SD) were used and Chi-square X2 test for association was employed.
Results
Out of the total 196 responses, only (40%) of the students had normal weight (SD 1.1), (25%) students had a good understanding of health promotion (SD 1.6), half (50%) appeared concerned about their weight (SD 0.5), (60%) had an obese family member (0.5). The BMI of students was associated with the presence of an obese member in their family and their weight as a concern for them. (P-value <0.05).
Conclusion
The health promotion service is beneficial as it was found to have raised concerns in the mind of the students regarding over weight and obesity. However it was observed that the understanding of health promotion service was different among students and this is the root of the problem.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Automobile Management System Project Report.pdfKamal Acharya
The proposed project is developed to manage the automobile in the automobile dealer company. The main module in this project is login, automobile management, customer management, sales, complaints and reports. The first module is the login. The automobile showroom owner should login to the project for usage. The username and password are verified and if it is correct, next form opens. If the username and password are not correct, it shows the error message.
When a customer search for a automobile, if the automobile is available, they will be taken to a page that shows the details of the automobile including automobile name, automobile ID, quantity, price etc. “Automobile Management System” is useful for maintaining automobiles, customers effectively and hence helps for establishing good relation between customer and automobile organization. It contains various customized modules for effectively maintaining automobiles and stock information accurately and safely.
When the automobile is sold to the customer, stock will be reduced automatically. When a new purchase is made, stock will be increased automatically. While selecting automobiles for sale, the proposed software will automatically check for total number of available stock of that particular item, if the total stock of that particular item is less than 5, software will notify the user to purchase the particular item.
Also when the user tries to sale items which are not in stock, the system will prompt the user that the stock is not enough. Customers of this system can search for a automobile; can purchase a automobile easily by selecting fast. On the other hand the stock of automobiles can be maintained perfectly by the automobile shop manager overcoming the drawbacks of existing system.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
The Benefits and Techniques of Trenchless Pipe Repair.pdf
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTING
1. www.ijiarec.com
Author for Correspondence:
*1
Ms.V.Karunya, Department of CSE, Nandha Engineering College, Erode, Tamilnadu, India.
E-mail:Karunyavel07@gmail.com.
*2
Mrs.P.Sarala, Asst. Professor, Departmentof CSE, Nandha Engineering College, Erode, Tamilnadu, India.
E-mail:sarala.p@nandhaengg.org.
*3
Dr.N.Shanthi, Professor & Dean, Department of CSE, Nandha Engineering College, Erode, Tamilnadu, India.
E-mail:deancse@nandhaengg.org.
SEP-2014
International Journal of Intellectual Advancements
and Research in Engineering Computations
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN
CLOUD COMPUTING
*1
Ms.V.Karunya, *2
Mrs.P.Sarala, *3
Dr.N.Shanthi
ABSTRACT
Authenticating the user based on behaviour based biometrics is more reliable than the more traditional
means of password authentication. Biometric systems for today‘s high security applications must meet stringent
performance requirements. The fusion of multiple biometrics helps to minimize the system error rates. Fusion
methods include processing biometric modalities sequentially until an acceptable match is obtained. As security is
the main concern in using cloud computing fused biometric authentication technique which can be used as single
sign on so that the services can be more secure and reliable ,and that biometric authentication is provided as a
service by a cloud provider.
Index terms: Multimodal, Biometric, Fusion, Single Sign On.
I INTRODUCTION
Today a growing number of companies
have to process huge amounts of data in a cost-
efficient manner. Classic representatives for these
companies are operators of Internet search engines,
like Google, Yahoo, or Microsoft. The vast amount
of data they have to deal with every day has made
traditional database solutions prohibitively expensive.
Thus the cloud is best suitable for above
requirements.[1]. To provide security in cloud
biometric authentication system is used.
The word ―biometrics‖ comes from the
Greek language and is derived from the words bio
(life) and metric (to measure).Biometrics (or
biometric authentication) refers to the identification
of humans by their characteristics or traits. In
[3]Cloud computing is defined as a model for
enabling ubiquitous, convenient, on-demand network
access to a shared pool of configurable computing
resources (e.g., networks, servers, storage,
applications, and services) that can be rapidly
provisioned and released with minimal management
effort or service provider interaction. Hence, single
biometric may not be able to achieve the desired
performance requirement in real world applications.
One of the methods to overcome these problems is to
make use of multimodal biometric authentication
systems, which combine information from multiple
modalities to arrive at a decision.
Studies have demonstrated that multimodal
biometric systems can achieve better performance
compared with unimodal systems. This paper
presents the review of multimodal biometrics. This
includes applications, challenges and areas of
research in multimodal biometrics. The different
fusion techniques of multimodal biometrics have
been discussed.
ISSN:2348-2079