A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n
meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images
except for all of images. The shared secret image can be revealed by printing the share images on transparencies and
stacking the transparencies directly, so that the human visual system can recognize the shared secret image without using any
devices. The visual secrets sharing scheme for multiple secrets is called multiple-secret visual cryptographic schemes
(MVCSs). This paper proposed general constructions for threshold multiple-secret visual cryptographic schemes (MVCSs)
that are capable of encoding s secret images. This presented MVCS schemes utilize a predefined pattern book with pixel
expansion to encrypt secret images into share images. In our research, we propose a novel MVCS scheme that can share two
binary secret images on two rectangular share images with no pixel expansion, but also has an excellent recovery quality for
the secret images.
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...Editor IJCATR
The main purpose of this paper is to study the zero-divisor graph for direct product of finite commutative rings. In our
present investigation we discuss the zero-divisor graphs for the following direct products: direct product of the ring of integers under
addition and multiplication modulo p and the ring of integers under addition and multiplication modulo p2 for a prime number p,
direct product of the ring of integers under addition and multiplication modulo p and the ring of integers under addition and
multiplication modulo 2p for an odd prime number p and direct product of the ring of integers under addition and multiplication
modulo p and the ring of integers under addition and multiplication modulo p2 – 2 for that odd prime p for which p2 – 2 is a prime
number. The aim of this paper is to give some new ideas about the neighborhood, the neighborhood number and the adjacency matrix
corresponding to zero-divisor graphs for the above mentioned direct products. Finally, we prove some results of annihilators on zerodivisor
graph for direct product of A and B for any two commutative rings A and B with unity
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
In this paper, a new idea for two dimensional image deblurring algorithm is introduced which uses basic concepts of PDEs... The various methods to estimate the degradation function (PSF is known in prior called non-blind deblurring) for use in restoration are observation, experimentation and mathematical modeling. Here, PDE based mathematical modeling is proposed to model the degradation and recovery process. Several restoration methods such as Weiner Filtering, Inverse Filtering [1], Constrained Least Squares, and Lucy -Richardson iteration remove the motion blur either using Fourier Transformation in frequency domain or by using optimization techniques. The main difficulty with these methods is to estimate the deviation of the restored image from the original image at individual points that is due to the mechanism of these methods as processing in frequency domain .Another method, the travelling wave de-blurring method is a approach that works in spatial domain.PDE type of observation model describes well several physical mechanisms, such as relative motion between the camera and the subject (motion blur), bad focusing (defocusing blur), or a number of other mechanisms which are well modeled by a convolution. In last PDE method is compared with the existing restoration techniques such as weiner filters, median filters [2] and the results are compared on the basis of calculated PSNR for various noises
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterEditor IJCATR
This paper propose a method of personal identification based on finger-vein patterns. An image of a finger captured by the web camera under the IR light transmission contains not only the vein pattern itself; but also shade produced by various thickness of the finger muscles; bones; and tissue networks surrounding the vein. In this paper; we intro-duce preliminary process to enhance the image quality worsened by light effect and noise produced by the web camera; then segment the vein pattern by using adaptive threshold method and matched them using improved template matching. The main purposes of this paper are to investigate finger-vein technology; the applicable fields and whether finger-vein detection can solve the problems fingerprint detection imposes in certain industries
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
Adaptive Neural Fuzzy Inference System for Employability AssessmentEditor IJCATR
Employability is potential of a person for gaining and maintains employment. Employability is measure through the
education, personal development and understanding power. Employability is not the similar as ahead a graduate job, moderately it
implies something almost the capacity of the graduate to function in an employment and be capable to move between jobs, therefore
remaining employable through their life. This paper introduced a new adaptive neural fuzzy inference system for assessment of
employability with the help of some neuro fuzzy rules. The purpose and scope of this research is to examine the level of employability.
The concern research use both fuzzy inference systems and artificial neural network which is known as neuro fuzzy technique for
solve the problem of employability assessment. This paper use three employability skills as input and find a crisp value as output
which indicates the glassy of employee. It uses twenty seven neuro fuzzy rules, with the help of Sugeno type inference in Mat-lab and
finds single value output. The proposed system is named as Adaptive Neural Fuzzy Inference System for Employability Assessment
(ANFISEA).
A NOVEL METHOD FOR THE CONSTRUCTION OF THRESHOLD MULTIPLE-SECRET VISUAL CRYPT...Editor IJCATR
The main concept of the original visual secret sharing (VSS) scheme is to encrypt a secret image into n
meaningless share images. It cannot leak any information of the shared secret by any combination of the n share images
except for all of images. The shared secret image can be revealed by printing the share images on transparencies and
stacking the transparencies directly, so that the human visual system can recognize the shared secret image without using any
devices. The visual secrets sharing scheme for multiple secrets is called multiple-secret visual cryptographic schemes
(MVCSs). This paper proposed general constructions for threshold multiple-secret visual cryptographic schemes (MVCSs)
that are capable of encoding s secret images. This presented MVCS schemes utilize a predefined pattern book with pixel
expansion to encrypt secret images into share images. In our research, we propose a novel MVCS scheme that can share two
binary secret images on two rectangular share images with no pixel expansion, but also has an excellent recovery quality for
the secret images.
On the Adjacency Matrix and Neighborhood Associated with Zero-divisor Graph f...Editor IJCATR
The main purpose of this paper is to study the zero-divisor graph for direct product of finite commutative rings. In our
present investigation we discuss the zero-divisor graphs for the following direct products: direct product of the ring of integers under
addition and multiplication modulo p and the ring of integers under addition and multiplication modulo p2 for a prime number p,
direct product of the ring of integers under addition and multiplication modulo p and the ring of integers under addition and
multiplication modulo 2p for an odd prime number p and direct product of the ring of integers under addition and multiplication
modulo p and the ring of integers under addition and multiplication modulo p2 – 2 for that odd prime p for which p2 – 2 is a prime
number. The aim of this paper is to give some new ideas about the neighborhood, the neighborhood number and the adjacency matrix
corresponding to zero-divisor graphs for the above mentioned direct products. Finally, we prove some results of annihilators on zerodivisor
graph for direct product of A and B for any two commutative rings A and B with unity
Duplicate Code Detection using Control StatementsEditor IJCATR
Code clone detection is an important area of research as reusability is a key factor in software evolution. Duplicate code
degrades the design and structure of software and software qualities like readability, changeability, maintainability. Code clone
increases the maintenance cost as incorrect changes in copied code may lead to more errors. In this paper we address structural code
similarity detection and propose new methods to detect structural clones using structure of control statements. By structure we mean
order of control statements used in the source code. We have considered two orders of control structures: (i) Sequence of control
statements as it appears (ii) Execution flow of control statements.
Non-Blind Deblurring Using Partial Differential Equation MethodEditor IJCATR
In this paper, a new idea for two dimensional image deblurring algorithm is introduced which uses basic concepts of PDEs... The various methods to estimate the degradation function (PSF is known in prior called non-blind deblurring) for use in restoration are observation, experimentation and mathematical modeling. Here, PDE based mathematical modeling is proposed to model the degradation and recovery process. Several restoration methods such as Weiner Filtering, Inverse Filtering [1], Constrained Least Squares, and Lucy -Richardson iteration remove the motion blur either using Fourier Transformation in frequency domain or by using optimization techniques. The main difficulty with these methods is to estimate the deviation of the restored image from the original image at individual points that is due to the mechanism of these methods as processing in frequency domain .Another method, the travelling wave de-blurring method is a approach that works in spatial domain.PDE type of observation model describes well several physical mechanisms, such as relative motion between the camera and the subject (motion blur), bad focusing (defocusing blur), or a number of other mechanisms which are well modeled by a convolution. In last PDE method is compared with the existing restoration techniques such as weiner filters, median filters [2] and the results are compared on the basis of calculated PSNR for various noises
Finger Vein Detection using Gabor Filter, Segmentation and Matched FilterEditor IJCATR
This paper propose a method of personal identification based on finger-vein patterns. An image of a finger captured by the web camera under the IR light transmission contains not only the vein pattern itself; but also shade produced by various thickness of the finger muscles; bones; and tissue networks surrounding the vein. In this paper; we intro-duce preliminary process to enhance the image quality worsened by light effect and noise produced by the web camera; then segment the vein pattern by using adaptive threshold method and matched them using improved template matching. The main purposes of this paper are to investigate finger-vein technology; the applicable fields and whether finger-vein detection can solve the problems fingerprint detection imposes in certain industries
Effective Parameters of Image Steganography TechniquesEditor IJCATR
Steganography is a branch of information hiding method to hide secret data in the media such as audio, images, videos, etc.
The use of images is very common in the world of electronic communication. In this paper, the parameters that are important in
steganography images, have been studied and analyzed. Steganography purposes of security, robustness and capacity of which three
are located at three vertices of a triangle, each note entail ignoring others. The main parameters of the methods steganography they've
Security, Capacity, Psnr, Mse, Ber, Ssim are the results of the implementation show, steganography methods that these parameters
provide have mentioned goals than other methods have improved
Adaptive Neural Fuzzy Inference System for Employability AssessmentEditor IJCATR
Employability is potential of a person for gaining and maintains employment. Employability is measure through the
education, personal development and understanding power. Employability is not the similar as ahead a graduate job, moderately it
implies something almost the capacity of the graduate to function in an employment and be capable to move between jobs, therefore
remaining employable through their life. This paper introduced a new adaptive neural fuzzy inference system for assessment of
employability with the help of some neuro fuzzy rules. The purpose and scope of this research is to examine the level of employability.
The concern research use both fuzzy inference systems and artificial neural network which is known as neuro fuzzy technique for
solve the problem of employability assessment. This paper use three employability skills as input and find a crisp value as output
which indicates the glassy of employee. It uses twenty seven neuro fuzzy rules, with the help of Sugeno type inference in Mat-lab and
finds single value output. The proposed system is named as Adaptive Neural Fuzzy Inference System for Employability Assessment
(ANFISEA).
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
The wireless sensor network is an networking field that combines sensing, computation, and communication into a single
tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much
work has focused on making sensor networks realistic and useful, but still security in sensor network data communication is big issue
for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor
network to save energy factor of the sensor nodes and to save time for data communication between the sensor nodes in the network
Medical Science is considered as a field of uncertainty, vagueness and complexity. Fuzzy logic plays an important role to deal with these uncertainty, vagueness and complexity. Detection of diseases in medical is a very difficult task. To improve accuracy rate engineers helping in detection of the diseases by developing the Expert System using Fuzzy Logic. Fuzzy logic consists of many valued logic. It has varying values in the range of 0 and 1 instead of fix values. In this study, we developed a Fuzzy Expert system to detect Anemia on the basis of Symptoms as well as clinical test.
Energy saving Wireless Sensor Networks using KerberosEditor IJCATR
The wireless sensor network is an networking field that combines sensing, computation, and communication into a single
tiny device. As sensor networks frame closer towards well-known deployment, security issues become a vital concern. So far, much
work has focused on making sensor networks realistic and useful, but still security in sensor network data communication is big issue
for research. This paper proposed the idea of having different Kerberos authentication architecture for the different clusters in sensor
network to save energy factor of the sensor nodes and to save time for data communication between the sensor nodes in the network
Medical Science is considered as a field of uncertainty, vagueness and complexity. Fuzzy logic plays an important role to deal with these uncertainty, vagueness and complexity. Detection of diseases in medical is a very difficult task. To improve accuracy rate engineers helping in detection of the diseases by developing the Expert System using Fuzzy Logic. Fuzzy logic consists of many valued logic. It has varying values in the range of 0 and 1 instead of fix values. In this study, we developed a Fuzzy Expert system to detect Anemia on the basis of Symptoms as well as clinical test.