In this paper, another way to deal with distinguish, the issue that emerges in offiline manually written signature recongition as been examined. As opposed to numerous current framework, an endeavor made utilizing Edgehinge and Edge Extraction method. To finish this assignment, as an initial step the mark test is preprocessed and standardized to perform content distinguishing proof effectively. The second step removing the data and educational components occured amid this period. At long last the Signature Sampleization decission was done in view of Data Acquisition and Preprocessing, Feature extraction. Edgehinge dissemination is an element that describes the adjustments in heading of a script stroke in the specimen of signature. The edgehinge appropriation is extricated by method for a windowpane that is slid over an edge-identified double picture. At whatever point the mid pixel of the window is on, the two edge pieces (i.e. associated arrangements of pixels) rising up out of this mid pixel are measured. Their headings are measured and put away as sets. A joint likelihood appropriation is acquired from an expansive specimen of such matches. Regardless of ceaseless exertion, offiline signature recognizable proof remains a testing issue, because of various methodologies use distinctive assortments of elements, having diverse. Subsequently, our study will concentrate on acknowledgment in light of highlight determination to rearrange highlights removing assignment, enhance Signature Sampleization framework many-sided quality, lessen running time and enhance the order precision.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mechanical and civil engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mechanical and civil engineering. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Authentication of a person is the major concern in this era for security purposes. In biometric systems Signature is one of the behavioural features used for the authentication purpose. In this paper we work on the offline signature collected through different persons. Morphological operations are applied on these signature images with Hough transform to determine regular shape which assists in authentication process. The values extracted from this Hough space is used in the feed forward neural network which is trained using back-propagation algorithm. After the different training stages efficiency found above more than 95%. Application of this system will be in the security concerned fields, in the defence security, biometric authentication, as biometric computer protection or as method of the analysis of person’s behaviour changes.
This slide proposed a method to authenticate a signature in off-line. Our proposed method uses "Harris Corner Detector", "Orientation Assignment" , "KNN Classifier", "Hungarian Algorithm".
An offline signature recognition and verification system based on neural networkeSAT Journals
Abstract Various techniques are already introduced for personal identification and verification based on different types of biometrics which can be physiological or behavioral. Signatures lies in the category of behavioral biometric which can distort or changed with course of time. Signatures are considered to be most promising authentication method in all legal and financial documents. It is necessary to verify signers and their respective signatures. This paper presents an Offline Signature recognition and verification system(SRVS). In this system signature database of signature images is created, followed by image preprocessing, feature extraction, neural network design and training, and classification of signature as genuine or counterfeit. Keywords: biometrics, neural network design, feature extraction, classification etc.
A STUDY ON IMPACT OF BARCODE AND RADIO FREQUENCY IDENTIFICATION TECHNOLOGY ON...IAEME Publication
Bar-code technology has now widespread that many customers take it for granted as this technology continues to offer infinite benefits in a wide extent of businesses. The theoretical frame work is intended to gain responses with maximum users about automation and optimization of production using Barcode and RFID; since there is a limited user of RFID, the researcher was supposed to go with barcode users only. This study observed the importance and implementation of Barcode in manufacturing industries, how it works and appreciates productivity, its influence over the manufacturing chain and about its integration among the different units and frames of this sector
NAIVE APPROACH FOR MEMORY MANAGEMENT IN SMART HOME GATEWAYSIAEME Publication
This paper proposes efficient replacement algorithms for managing bundles or services in home gateways. Memory management has been studied extensively in operating system field. Here two algorithms have been proposed. The first one is an extension of Knapsack problem which finds the optimal solution in a polynomial time. The second one is a heuristic that spans the dependency graph and tries to free the required amount of memory while minimizing the number of terminated services. Memory management for software bundles executed in home gateways differs from traditional memory management techniques. Proposed algorithm is implemented as a part of the framework to provide memory management. The gateway can download the corresponding bundles (that correspond to specific services) when it becomes necessary. The gateway tends to terminate the victim service rather than suspending it.
VESTIGATION OF DYNAMIC INVOLVED IN DETERMINATION OF CAPITAL STRUCTURE OF KARU...IAEME Publication
An appropriate capital structure is a critical decision for any business organization to be taken
by business organization for maximization of shareholders wealth and sustained growth. The main
objectives this study was investigating the determinants of capital structure of the selected private
Bank in India. Thus, the major focus of this study was to investigate empirically firm specific factors
such as, Size, Tangibility, Profitability, Dividend Payout Ratio, Taxation, and Risk. In this study, only
secondary data was used. The data collected from the annual report published by the Bank.
COMPARATIVE STUDY OF DISTRIBUTED FREQUENT PATTERN MINING ALGORITHMS FOR BIG S...IAEME Publication
Association rule mining plays an important role in decision support system. Nowadays in the era of internet, various online marketing sites and social networking sites are generating enormous amount of structural/semi structural data in the form of sales data, tweets, emails, web pages and so on. This online generated data is too large that it becomes very complex to process and analyze it using traditional systems which consumes more time. This paper overcomes the main memory bottleneck in single computing system. There are two major goals of this paper. In this paper, big sales dataset of AMUL dairy is preprocessed using Hadoop Map Reduce that convert it into the transactional dataset. Then, after removing the null transactions; distributed frequent pattern mining algorithm MR-DARM (Map Reduce based Distributed Association Rule Mining) is used to find most frequent item set. Finally, strong association rules are generated from frequent item sets. The paper also compares the time efficiency of MR-DARM algorithm with existing Count Distributed Algorithm (CDA) and Fast Distributed Mining (FDM) distributed frequent pattern mining algorithms. The compared algorithms are presented together with experimental results that lead to the final conclusions.
AN INSIGHT INTO ATOMIC DIMENSION OF PERSONALITY AND STRESS MANAGEMENTIAEME Publication
In the contemporary business and management world, the meaning and scope of organizations have a broader meaning. Every type of organizations have their own challenges and stress factors. Similarly stress management dimensions require new outlook in the organization and organization behavior. During stress the coordination between the mind and body get unaligned. This article focuses on an atomic outlook of personality and stress handling methods.
INNER SELF-IMPROVEMENT PROGRAMS: PATHWAY TO GAIN INDEPENDENCE FROM THE DEPEND...IAEME Publication
Background - It is the movement of highly skilled and qualified people towards a country where they can work in better conditions and earn more money. It is also termed as “human capital flight” because it resembles the case of capital flight.
Objectives – The objective of the study is to analyze the causes and effects of brain drain of Nepalese students.
Methodology – Due to the specific nature of the research objectives, descriptive cum analytical research design has been used.
Findings – Brain drain is a serious problem in Nepal. It creates both a positive effect and a negative effect directly or indirectly in the economic development of the country.
Innovation is a wellspring of growth (Romer, P.M. 1987). Although innovation itself is a
continuous process for producing new ideas, productions, services and tools, conducting
innovation is highly environment-dependent or platform-dependent (Ping Lan, 2004). The rapid
development of information technology forces environments to change at a great speed that also
makes great changes to innovation itself in the digital-business environment. Given this
background, this paper is an attempt at examining the great changes to innovation brought by
information and technology, especially the Internet. Therefore, we put forward a new innovation
platform: E-innovation. In this paper, we discuss the definition, management, application of Einnovation;
we provide a five-D architectural framework of E-innovation; we also present an
example on the application of E-innovation and drive recommendation for E-innovation based on
research available.
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...IAEME Publication
In our paper, SRAN (single radio access network technology) supports multi-band and multi-mode communication for mobile users. In this, we address the signaling impact results of various mobile bands and its spectrum utilization, resource utilization for high speed and its reduced latency model. We deployed this architecture of network using reduced space capacity and increased network resource utilization. Achievements made by simplicity of baseband board technology. This introduces an optimization problem involving a trade-off between the number of additional bands that are required and the costs of moving through the mobile field for the purpose of spectrum usage. The Basic idea is to achieve 2G, 3G and LTE communication using a single multi-band rectangular antenna. The method proposed guarantee that no further delay or latency of the network can occur during the restoration. It considers about the energy consumption and the remaining energy of base station as well as quality of links to find energy-efficient and reliable routes that increase the operational lifetime of the network. Quality of Service of the communication network is also improved in rural or hilly regions. From this, we will analyze the multimode concurrency and conclude the performance of different bands. The performance can be shown in graphical model.
A STUDY ON CHALLENGES OF MULTICULTURAL TEAM MEMBERS OF IT SECTORIAEME Publication
The main purpose of this research paper is to identify the communication issues and conflicts among the multicultural team members and effect of these challenge factors on cultural diversity. The researcher developed a conceptual framework based on the review of literature and data collected from the IT employees through interviews. Convenient sampling method adapted for this descriptive study and 430 was the sample size. Data analysis had done using EFA, CFA, validity analysis and SEM. The result confirmed that communication issues and conflicts exist among the multicultural team members. The result revealed that cultural diversity had significant influences on communication issues and conflicts.
ARE THE SERVICES DELIVERED EMPLOYABLE? A SCENARIO OF TECHNICAL EDUCATION IN ...IAEME Publication
Purpose
One of the most appalling challenges in India is persistently rising unemployment, explicitly in
the rural region. More than 20% of Indian youth between the ages of 15 and 24 years are “seeking
or available for work,” as per 2011 census data. There will be no peace and prosperity in the
country unless jobless people get appropriate channel. In India deficiency of skills is among the
main constraints for recruitment of Technical Education. Productivity of Technical Education in
not entirely absorbed due to lack of skills required by the employers. Along with the ample
arguments, taking place in recent times, regarding reformation in the productivity of Technical
Education, this present study syndicates focus on services delivered and its impact on employability
skills. The objective of this paper is to find out whether Technical Education institutes in rural part
are keen to focus on the employability skills? The paper also focuses on distinguished skills
required by the employer for recruitment. The study also emphases on the services offered by the
Institutes and their correlation on skills development.
Design methodology
A qualitative research survey through a structured questionnaire for the students who are
studying or have recently completed their Technical Education affiliated to the North Maharashtra
University, Jalgaon was conducted which is situated in rural part of India.
Findings
The study discusses umpteen employability skills and explains how embedding services of
technical education are correlated to the growth and development of employability skills. The study
finds that these services results in comprehensive and cohesiveness of employability skills.
Research limitations
The survey is delimited to the Technical Education belonging to North Maharashtra University,
Jalgaon and located in rural of India.
A STUDY ON IMPACT OF BARCODE AND RADIO FREQUENCY IDENTIFICATION TECHNOLOGY ON...IAEME Publication
Bar-code technology has now widespread that many customers take it for granted as this technology continues to offer infinite benefits in a wide extent of businesses. The theoretical frame work is intended to gain responses with maximum users about automation and optimization of production using Barcode and RFID; since there is a limited user of RFID, the researcher was supposed to go with barcode users only. This study observed the importance and implementation of Barcode in manufacturing industries, how it works and appreciates productivity, its influence over the manufacturing chain and about its integration among the different units and frames of this sector.
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...IAEME Publication
Texture information is exploited for classification of HSI (Hyperspectral Imagery) at high spatial resolution. For this purpose, framework employs to LBP (Local Binary Pattern) to extract local image features such as edges, corners & spots. After the extraction of LBP feature two levels of fusions are applied along with Gabor feature & spectral feature, i.e. Feature level fusion & Decision level fusion. In Feature level fusion multiple features are concurred before pattern classification. While in decision level fusion, it works on probability output of each individual classification pipeline combines the distinct decisions into final one. Decision level fusion consists of either hard fusion, soft fusion method. In hard fusion we consider majority part & in soft fusion linear logarithmic opinion pool at probability level (LOGP). In addition to this, extreme learning machine (ELM) classifier is included which is more efficient than support vector machine (SVM), used to provide probability classification output. It has simple structure with one hidden layer & one linear output layer. ELM trained much faster than SVM.
TAX REFORM FOR DEVELOPING VIABLE AND SUSTAINABLE TAX SYSTEMS IN INDIA WITH SP...IAEME Publication
Most developing countries continue to face severe issues in developing adequate and quick to
respond tax systems. While each of these paths to reform is necessary, in the end what 50 years of
experience tells us is that improving the precision and understanding with which fiscal issues both
within and outside government, is the really essential ingredient to developing viable and
sustainable tax systems in developing countries like India. Indian taxation system has undergone
remarkable reforms during the last decade. The tax rates have been rationalized and tax laws have
been simplified resulting in better compliance, ease of tax payment and better enforcement. The
process of validation of tax administration is ongoing in India.
Another key objective of tax reform measures has been to increase total tax to GDP ratio as a
means of achieving fiscal consolidation and improving resource allocation. GST, easier tax filing
methodology and simpler tax structures – Government of India is working to enhance the
government's revenue collection, at the same time ensuring that cumbersome taxes do not deter
investors. This paper review the three principal ways in which developing countries like India may
develop and progress their taxation systems - base-broadening, rate reduction, and administrative
improvement - in the context of the political economy of tax reform.
SOCIAL INNOVATION AND SOCIAL ENTREPRENEURSHIP - AN ELUCIDATION FOR THE PROBLE...IAEME Publication
In this paper, we addressed issues regarding the importance of social innovation (SI) and
social entrepreneurship (SE) within a society which is in a profound and rapid change and
transformation that marks all the areas of social life. The fundamental objective of the study was to
analyze the concepts of social innovation and social entrepreneurship as providers of both social
value and growth of life quality. We highlighted the inter-conditioning relationship between these
two concepts and showed the need for social innovations to respond to some challenges of the
society, such as aging, budgetary pressure and others. This paper proposes a model of social
entrepreneurship at the intersection of three sectors: state, market and civil society, in its efforts to
meet the more and more sophisticated requests of the contemporary society. Thus, the whole
society must be connected to the new innovative social models
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...IAEME Publication
Texture information is exploited for classification of HSI (Hyperspectral Imagery) at high spatial resolution. For this purpose, framework employs to LBP (Local Binary Pattern) to extract local image features such as edges, corners & spots. After the extraction of LBP feature two levels of fusions are applied along with Gabor feature & spectral feature, i.e. Feature level fusion & Decision level fusion. In Feature level fusion multiple features are concurred before pattern classification. While in decision level fusion, it works on probability output of each individual classification pipeline combines the distinct decisions into final one. Decision level fusion consists of either hard fusion, soft fusion method. In hard fusion we consider majority part & in soft fusion linear logarithmic opinion pool at probability level (LOGP). In addition to this, extreme learning machine (ELM) classifier is included which is more efficient than support vector machine (SVM), used to provide probability classification output. It has simple structure with one hidden layer & one linear output layer. ELM trained much faster than SVM.
PRODUCTION OF ALTERNATIVE FUEL USING GASIFICATION BY SYNTHESIS OF FISCHER-TRO...IAEME Publication
The solid carbonaceous fuel is converted into combustible gas (energy) using limited amount of air it is called Gasification process the gases which evolve are known as “producer gas”. This is more suitable than the direct combustion of biomass gases. In this paper an updraft gasifier is construct and is used to carry out the experiment. updraft gasifier is one of the boiler. The waste material like coconut shells, sugarcane waste, and wood particles are used for the generation of producer gas. The sense of this paper is to study the effect of waste products (coconut shells, sugarcane waste, and wood particles) in form of biomass. The performance of the gasifier is evaluated in terms of zone temperature with different air velocity. By taking the different fuels and varying the air flow rate the temperature of the zones are analysed. The arrangement of tar is also seen in this apparatus. After analysis the maximum temperature give for coconut shell (waste) all three place as compare to other two .so coconut shell is the best suitable material for this gasifier.
ANALYSIS OF NON PERFORMING ASSETS IN PUBLIC SECTOR BANKS OF INDIA IAEME Publication
The Banks being the mobiliser of finances of different sectors of economy, are expected to be
strong enough to withstand the shocks like inflation, depression etc. and to cushion the other
financial Institutions along with industries and common people against financial crisis. The Public
Sector Banks having a large stake of the Government in their Capital structure are preferred by the
commoners often. In this context, this paper tries to depict both the Gross Non Performing Asset
and Net Non Performing Asset position of Public Sector Banks in India and attempts to find
whether there is any significant difference among them. This paper also tries to show the impact of
GNPA on Net Profit of the selected banks for the last 5 years..
MIXED CONVECTIVE HEAT AND MASS TRANSFER MHD FLOW PAST AN UNSTEADY STRETCHING ...IAEME Publication
Mixed two dimensional convection heat and mass transfer flow with suction, viscous
dissipation, heat source/sink effect, mass diffusion including Soret and Dufour effects due to an
unsteady porous stretching sheet is studied in the present analysis. The flow is subjected to
magnetic field normal to the vertical plate in a saturated porous medium. The governing non-linear
partial differential equations have been reduced to ordinary differential equations using suitable
similarity transformation variables. The resultant equations which are coupled and highly nonlinear
are solved by standard Runge-Kutta fourth order numerical technique via shooting method.
The momentum, temperature and concentration field distributions are analyzed and discussed
numerically and presented pictorially through graphs. Numerical values for skin friction
coefficient, local Nusselt number and Sherwood number at the plate in the presence of magnetic
field and porous medium are derived and discussed for various values of physical parameters and
are presented in table. Finally the present results are compared with previously published results
and found to be well in agreement.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
A STUDY ON IMPACT OF BARCODE AND RADIO FREQUENCY IDENTIFICATION TECHNOLOGY ON...IAEME Publication
Bar-code technology has now widespread that many customers take it for granted as this technology continues to offer infinite benefits in a wide extent of businesses. The theoretical frame work is intended to gain responses with maximum users about automation and optimization of production using Barcode and RFID; since there is a limited user of RFID, the researcher was supposed to go with barcode users only. This study observed the importance and implementation of Barcode in manufacturing industries, how it works and appreciates productivity, its influence over the manufacturing chain and about its integration among the different units and frames of this sector
NAIVE APPROACH FOR MEMORY MANAGEMENT IN SMART HOME GATEWAYSIAEME Publication
This paper proposes efficient replacement algorithms for managing bundles or services in home gateways. Memory management has been studied extensively in operating system field. Here two algorithms have been proposed. The first one is an extension of Knapsack problem which finds the optimal solution in a polynomial time. The second one is a heuristic that spans the dependency graph and tries to free the required amount of memory while minimizing the number of terminated services. Memory management for software bundles executed in home gateways differs from traditional memory management techniques. Proposed algorithm is implemented as a part of the framework to provide memory management. The gateway can download the corresponding bundles (that correspond to specific services) when it becomes necessary. The gateway tends to terminate the victim service rather than suspending it.
VESTIGATION OF DYNAMIC INVOLVED IN DETERMINATION OF CAPITAL STRUCTURE OF KARU...IAEME Publication
An appropriate capital structure is a critical decision for any business organization to be taken
by business organization for maximization of shareholders wealth and sustained growth. The main
objectives this study was investigating the determinants of capital structure of the selected private
Bank in India. Thus, the major focus of this study was to investigate empirically firm specific factors
such as, Size, Tangibility, Profitability, Dividend Payout Ratio, Taxation, and Risk. In this study, only
secondary data was used. The data collected from the annual report published by the Bank.
COMPARATIVE STUDY OF DISTRIBUTED FREQUENT PATTERN MINING ALGORITHMS FOR BIG S...IAEME Publication
Association rule mining plays an important role in decision support system. Nowadays in the era of internet, various online marketing sites and social networking sites are generating enormous amount of structural/semi structural data in the form of sales data, tweets, emails, web pages and so on. This online generated data is too large that it becomes very complex to process and analyze it using traditional systems which consumes more time. This paper overcomes the main memory bottleneck in single computing system. There are two major goals of this paper. In this paper, big sales dataset of AMUL dairy is preprocessed using Hadoop Map Reduce that convert it into the transactional dataset. Then, after removing the null transactions; distributed frequent pattern mining algorithm MR-DARM (Map Reduce based Distributed Association Rule Mining) is used to find most frequent item set. Finally, strong association rules are generated from frequent item sets. The paper also compares the time efficiency of MR-DARM algorithm with existing Count Distributed Algorithm (CDA) and Fast Distributed Mining (FDM) distributed frequent pattern mining algorithms. The compared algorithms are presented together with experimental results that lead to the final conclusions.
AN INSIGHT INTO ATOMIC DIMENSION OF PERSONALITY AND STRESS MANAGEMENTIAEME Publication
In the contemporary business and management world, the meaning and scope of organizations have a broader meaning. Every type of organizations have their own challenges and stress factors. Similarly stress management dimensions require new outlook in the organization and organization behavior. During stress the coordination between the mind and body get unaligned. This article focuses on an atomic outlook of personality and stress handling methods.
INNER SELF-IMPROVEMENT PROGRAMS: PATHWAY TO GAIN INDEPENDENCE FROM THE DEPEND...IAEME Publication
Background - It is the movement of highly skilled and qualified people towards a country where they can work in better conditions and earn more money. It is also termed as “human capital flight” because it resembles the case of capital flight.
Objectives – The objective of the study is to analyze the causes and effects of brain drain of Nepalese students.
Methodology – Due to the specific nature of the research objectives, descriptive cum analytical research design has been used.
Findings – Brain drain is a serious problem in Nepal. It creates both a positive effect and a negative effect directly or indirectly in the economic development of the country.
Innovation is a wellspring of growth (Romer, P.M. 1987). Although innovation itself is a
continuous process for producing new ideas, productions, services and tools, conducting
innovation is highly environment-dependent or platform-dependent (Ping Lan, 2004). The rapid
development of information technology forces environments to change at a great speed that also
makes great changes to innovation itself in the digital-business environment. Given this
background, this paper is an attempt at examining the great changes to innovation brought by
information and technology, especially the Internet. Therefore, we put forward a new innovation
platform: E-innovation. In this paper, we discuss the definition, management, application of Einnovation;
we provide a five-D architectural framework of E-innovation; we also present an
example on the application of E-innovation and drive recommendation for E-innovation based on
research available.
EFFECTIVE RESOURCE SHARING WITH UNIVERSAL BASE-BAND PROCESSING TECHNOLOGY SUP...IAEME Publication
In our paper, SRAN (single radio access network technology) supports multi-band and multi-mode communication for mobile users. In this, we address the signaling impact results of various mobile bands and its spectrum utilization, resource utilization for high speed and its reduced latency model. We deployed this architecture of network using reduced space capacity and increased network resource utilization. Achievements made by simplicity of baseband board technology. This introduces an optimization problem involving a trade-off between the number of additional bands that are required and the costs of moving through the mobile field for the purpose of spectrum usage. The Basic idea is to achieve 2G, 3G and LTE communication using a single multi-band rectangular antenna. The method proposed guarantee that no further delay or latency of the network can occur during the restoration. It considers about the energy consumption and the remaining energy of base station as well as quality of links to find energy-efficient and reliable routes that increase the operational lifetime of the network. Quality of Service of the communication network is also improved in rural or hilly regions. From this, we will analyze the multimode concurrency and conclude the performance of different bands. The performance can be shown in graphical model.
A STUDY ON CHALLENGES OF MULTICULTURAL TEAM MEMBERS OF IT SECTORIAEME Publication
The main purpose of this research paper is to identify the communication issues and conflicts among the multicultural team members and effect of these challenge factors on cultural diversity. The researcher developed a conceptual framework based on the review of literature and data collected from the IT employees through interviews. Convenient sampling method adapted for this descriptive study and 430 was the sample size. Data analysis had done using EFA, CFA, validity analysis and SEM. The result confirmed that communication issues and conflicts exist among the multicultural team members. The result revealed that cultural diversity had significant influences on communication issues and conflicts.
ARE THE SERVICES DELIVERED EMPLOYABLE? A SCENARIO OF TECHNICAL EDUCATION IN ...IAEME Publication
Purpose
One of the most appalling challenges in India is persistently rising unemployment, explicitly in
the rural region. More than 20% of Indian youth between the ages of 15 and 24 years are “seeking
or available for work,” as per 2011 census data. There will be no peace and prosperity in the
country unless jobless people get appropriate channel. In India deficiency of skills is among the
main constraints for recruitment of Technical Education. Productivity of Technical Education in
not entirely absorbed due to lack of skills required by the employers. Along with the ample
arguments, taking place in recent times, regarding reformation in the productivity of Technical
Education, this present study syndicates focus on services delivered and its impact on employability
skills. The objective of this paper is to find out whether Technical Education institutes in rural part
are keen to focus on the employability skills? The paper also focuses on distinguished skills
required by the employer for recruitment. The study also emphases on the services offered by the
Institutes and their correlation on skills development.
Design methodology
A qualitative research survey through a structured questionnaire for the students who are
studying or have recently completed their Technical Education affiliated to the North Maharashtra
University, Jalgaon was conducted which is situated in rural part of India.
Findings
The study discusses umpteen employability skills and explains how embedding services of
technical education are correlated to the growth and development of employability skills. The study
finds that these services results in comprehensive and cohesiveness of employability skills.
Research limitations
The survey is delimited to the Technical Education belonging to North Maharashtra University,
Jalgaon and located in rural of India.
A STUDY ON IMPACT OF BARCODE AND RADIO FREQUENCY IDENTIFICATION TECHNOLOGY ON...IAEME Publication
Bar-code technology has now widespread that many customers take it for granted as this technology continues to offer infinite benefits in a wide extent of businesses. The theoretical frame work is intended to gain responses with maximum users about automation and optimization of production using Barcode and RFID; since there is a limited user of RFID, the researcher was supposed to go with barcode users only. This study observed the importance and implementation of Barcode in manufacturing industries, how it works and appreciates productivity, its influence over the manufacturing chain and about its integration among the different units and frames of this sector.
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...IAEME Publication
Texture information is exploited for classification of HSI (Hyperspectral Imagery) at high spatial resolution. For this purpose, framework employs to LBP (Local Binary Pattern) to extract local image features such as edges, corners & spots. After the extraction of LBP feature two levels of fusions are applied along with Gabor feature & spectral feature, i.e. Feature level fusion & Decision level fusion. In Feature level fusion multiple features are concurred before pattern classification. While in decision level fusion, it works on probability output of each individual classification pipeline combines the distinct decisions into final one. Decision level fusion consists of either hard fusion, soft fusion method. In hard fusion we consider majority part & in soft fusion linear logarithmic opinion pool at probability level (LOGP). In addition to this, extreme learning machine (ELM) classifier is included which is more efficient than support vector machine (SVM), used to provide probability classification output. It has simple structure with one hidden layer & one linear output layer. ELM trained much faster than SVM.
TAX REFORM FOR DEVELOPING VIABLE AND SUSTAINABLE TAX SYSTEMS IN INDIA WITH SP...IAEME Publication
Most developing countries continue to face severe issues in developing adequate and quick to
respond tax systems. While each of these paths to reform is necessary, in the end what 50 years of
experience tells us is that improving the precision and understanding with which fiscal issues both
within and outside government, is the really essential ingredient to developing viable and
sustainable tax systems in developing countries like India. Indian taxation system has undergone
remarkable reforms during the last decade. The tax rates have been rationalized and tax laws have
been simplified resulting in better compliance, ease of tax payment and better enforcement. The
process of validation of tax administration is ongoing in India.
Another key objective of tax reform measures has been to increase total tax to GDP ratio as a
means of achieving fiscal consolidation and improving resource allocation. GST, easier tax filing
methodology and simpler tax structures – Government of India is working to enhance the
government's revenue collection, at the same time ensuring that cumbersome taxes do not deter
investors. This paper review the three principal ways in which developing countries like India may
develop and progress their taxation systems - base-broadening, rate reduction, and administrative
improvement - in the context of the political economy of tax reform.
SOCIAL INNOVATION AND SOCIAL ENTREPRENEURSHIP - AN ELUCIDATION FOR THE PROBLE...IAEME Publication
In this paper, we addressed issues regarding the importance of social innovation (SI) and
social entrepreneurship (SE) within a society which is in a profound and rapid change and
transformation that marks all the areas of social life. The fundamental objective of the study was to
analyze the concepts of social innovation and social entrepreneurship as providers of both social
value and growth of life quality. We highlighted the inter-conditioning relationship between these
two concepts and showed the need for social innovations to respond to some challenges of the
society, such as aging, budgetary pressure and others. This paper proposes a model of social
entrepreneurship at the intersection of three sectors: state, market and civil society, in its efforts to
meet the more and more sophisticated requests of the contemporary society. Thus, the whole
society must be connected to the new innovative social models
HYPERSPECTRAL IMAGERY CLASSIFICATION USING TECHNOLOGIES OF COMPUTATIONAL INTE...IAEME Publication
Texture information is exploited for classification of HSI (Hyperspectral Imagery) at high spatial resolution. For this purpose, framework employs to LBP (Local Binary Pattern) to extract local image features such as edges, corners & spots. After the extraction of LBP feature two levels of fusions are applied along with Gabor feature & spectral feature, i.e. Feature level fusion & Decision level fusion. In Feature level fusion multiple features are concurred before pattern classification. While in decision level fusion, it works on probability output of each individual classification pipeline combines the distinct decisions into final one. Decision level fusion consists of either hard fusion, soft fusion method. In hard fusion we consider majority part & in soft fusion linear logarithmic opinion pool at probability level (LOGP). In addition to this, extreme learning machine (ELM) classifier is included which is more efficient than support vector machine (SVM), used to provide probability classification output. It has simple structure with one hidden layer & one linear output layer. ELM trained much faster than SVM.
PRODUCTION OF ALTERNATIVE FUEL USING GASIFICATION BY SYNTHESIS OF FISCHER-TRO...IAEME Publication
The solid carbonaceous fuel is converted into combustible gas (energy) using limited amount of air it is called Gasification process the gases which evolve are known as “producer gas”. This is more suitable than the direct combustion of biomass gases. In this paper an updraft gasifier is construct and is used to carry out the experiment. updraft gasifier is one of the boiler. The waste material like coconut shells, sugarcane waste, and wood particles are used for the generation of producer gas. The sense of this paper is to study the effect of waste products (coconut shells, sugarcane waste, and wood particles) in form of biomass. The performance of the gasifier is evaluated in terms of zone temperature with different air velocity. By taking the different fuels and varying the air flow rate the temperature of the zones are analysed. The arrangement of tar is also seen in this apparatus. After analysis the maximum temperature give for coconut shell (waste) all three place as compare to other two .so coconut shell is the best suitable material for this gasifier.
ANALYSIS OF NON PERFORMING ASSETS IN PUBLIC SECTOR BANKS OF INDIA IAEME Publication
The Banks being the mobiliser of finances of different sectors of economy, are expected to be
strong enough to withstand the shocks like inflation, depression etc. and to cushion the other
financial Institutions along with industries and common people against financial crisis. The Public
Sector Banks having a large stake of the Government in their Capital structure are preferred by the
commoners often. In this context, this paper tries to depict both the Gross Non Performing Asset
and Net Non Performing Asset position of Public Sector Banks in India and attempts to find
whether there is any significant difference among them. This paper also tries to show the impact of
GNPA on Net Profit of the selected banks for the last 5 years..
MIXED CONVECTIVE HEAT AND MASS TRANSFER MHD FLOW PAST AN UNSTEADY STRETCHING ...IAEME Publication
Mixed two dimensional convection heat and mass transfer flow with suction, viscous
dissipation, heat source/sink effect, mass diffusion including Soret and Dufour effects due to an
unsteady porous stretching sheet is studied in the present analysis. The flow is subjected to
magnetic field normal to the vertical plate in a saturated porous medium. The governing non-linear
partial differential equations have been reduced to ordinary differential equations using suitable
similarity transformation variables. The resultant equations which are coupled and highly nonlinear
are solved by standard Runge-Kutta fourth order numerical technique via shooting method.
The momentum, temperature and concentration field distributions are analyzed and discussed
numerically and presented pictorially through graphs. Numerical values for skin friction
coefficient, local Nusselt number and Sherwood number at the plate in the presence of magnetic
field and porous medium are derived and discussed for various values of physical parameters and
are presented in table. Finally the present results are compared with previously published results
and found to be well in agreement.
Highly Secured Bio-Metric Authentication Model with Palm Print IdentificationIJERA Editor
For securing personal identifications and highly secure identification problems, biometric technologies will
provide higher security with improved accuracy. This has become an emerging technology in recent years due to
the transaction frauds, security breaches and personal identification etc. The beauty of biometric technology is it
provides a unique code for each person and it can’t be copied or forged by others. To overcome the draw backs
of finger print identification systems, here in this paper we proposed a palm print based personal identification
system, which is a most promising and emerging research area in biometric identification systems due to its
uniqueness, scalability, faster execution speed and large area for extracting the features. It provides higher
security over finger print biometric systems with its rich features like wrinkles, continuous ridges, principal
lines, minutiae points, and singular points. The main aim of proposed palm print identification system is to
implement a system with higher accuracy and increased speed in identifying the palm prints of several users.
Here, in this we presented a highly secured palm print identification system with extraction of region of interest
(ROI) with morphological operation there by applying un-decimated bi-orthogonal wavelet (UDBW) transform
to extract the low level features of registered palm prints to calculate its feature vectors (FV) then after the
comparison is done by measuring the distance between registered palm feature vector and testing palm print
feature vector. Simulation results show that the proposed biometric identification system provides more
accuracy and reliable recognition rate
Automatic signature verification with chain code using weighted distance and ...eSAT Journals
Abstract The signature forgery can be restricted by either online or offline signature verification techniques. It verifies the signature by
performing a match with the pre-processed signature dynamically by detecting the motion of stylus during signature while on
other hand, offline verifies by performing a match using the two dimensional scanned image of the signature. This paper studies
about the various techniques available in offline signature verification along with their shadows.
Keywords: Signature Verification, Weighted Distance, High Pressure Factor, Normalization, Threshold Value
Pattern recognition using context dependent memory model (cdmm) in multimodal...ijfcstjournal
Pattern recognition is one of the prime concepts in current technologies in both private and public sectors.
The analysis and recognition of two or more patterns is a complex task due to several factors. The
consideration of two or more patterns requires huge space for keeping the storage media as well as
computational aspect. Vector logic gives very good strategy for recognition of patterns. This paper
proposes pattern recognition in multimodal authentication system with the use of vector logic and makes
the computation model hard and less error rate. Using PCA two to three biometric patterns will be fusion
and then various key sizes will be extracted using LU factorization approach. The selected keys will be
combined using vector logic, which introduces a memory model often called Context Dependent Memory
Model (CDMM) as computational model in multimodal authentication system that gives very accurate and
very effective outcome for authentication as well as verification. In the verification step, Mean Square
Error (MSE) and Normalized Correlation (NC) as metrics to minimize the error rate for the proposed
model and the performance analysis will be presented.
An offline signature verification using pixels intensity levelsSalam Shah
Offline signature recognition has great importance in our day to day activities. Researchers are trying to use them as biometric identification in various areas like banks, security systems and for other identification purposes. Fingerprints, iris, thumb impression and face detection based biometrics are successfully used for identification of individuals because of their static nature. However, people’s signatures show variability that makes it difficult to recognize the original signatures correctly and to use them as biometrics. The handwritten signatures have importance in banks for cheque, credit card processing, legal and financial transactions, and the signatures are the main target of fraudulence. To deal with complex signatures, there should be a robust signature verification method in places such as banks that can correctly classify the signatures into genuine or forgery to avoid financial frauds. This paper, presents a pixels intensity level based offline signature verification model for the correct classification of signatures. To achieve the target, three statistical classifiers; Decision Tree (J48), probability based Naïve Bayes (NB tree) and Euclidean distance based k-Nearest Neighbor (IBk), are used.
For comparison of the accuracy rates of offline signatures with online signatures, three classifiers were applied on online signature database and achieved a 99.90% accuracy rate with decision tree (J48), 99.82% with Naïve Bayes Tree and 98.11% with K-Nearest Neighbor (with 10 fold cross validation). The results of offline signatures were 64.97% accuracy rate with decision tree (J48), 76.16% with Naïve Bayes Tree and 91.91% with k-Nearest Neighbor (IBk) (without forgeries). The accuracy rate dropped with the inclusion of forgery signatures as, 55.63% accuracy rate with decision tree (J48), 67.02% with Naïve Bayes Tree and 88.12% (with forgeries).
Offline signature identification using high intensity variations and cross ov...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Signature verification based on proposed fast hyper deep neural networkIAESIJAI
Many industries have made widespread use of the handwittern signature verification system, including banking, education, legal proceedings, and criminal investigation, in which verification and identification are absolutely necessary. In this research, we have developed an accurate offline signature verification model that can be used in a writer-independent scenario. First, the handwitten signature images went through four preprocessing stages in order to be suitable for finding the unique features. Then, three different types of features namely principal component analysis (PCA) as appearance-based features, gray-level co-occurrence matrix (GLCM) as texture-features, and fast Fourier transform (FFT) as frequency-features are extracted from signature images in order to build a hybrid feature vector for each image. Finally, to classify signature features, we have designed a proposed fast hyper deep neural network (FHDNN) architecture. Two different datasets are used to evaluate our model these are SigComp2011, and CEDAR datasets. The results collected demonstrate that the suggested model can operate with accuracy equal to 100%, outperforming several of its predecessors. In the terms of (precision, recall, and F-score) it gives a very good results for both datasets and exceeds (1.00, 0.487, and 0.655 respectively) on Sigcomp2011 dataset and (1.00, 0.507, and 0.672 respectively) on CEDAR dataset.
A review on signature detection and signature based document image retrievaleSAT Journals
Abstract
Transforming a paper document to its electronic version in a form suitable for efficient storage, retrieval, and interpretation continues to be a challenging problem. Signature is an individualistic identification of a person. It is an authentic identification because a signature cannot be copied by others. Signatures are a special case of handwriting subject to intra personal variation and inter personal differences. To counter check fraud and forgery of handwritten signatures, Signature extraction from printed text background and signature based document retrieval from a large dataset is necessary. A lot many techniques have been implemented successfully for both signature extraction and signature based document retrieval. This paper present techniques and methods evolved for signature extraction and signature based document retrieval.
Keywords: signature detection, signature extraction, Document image Retrieval, Query image retrieval
A review on signature detection and signature based document image retrievaleSAT Journals
Abstract
Gelcoat are widely used to provide exterior protection for the finished part of fiber reinforced composite material. It is a primary focus to achieve proper gelcoat film thickness because it is a critical control point for crack prevention which is able to increase mechanical strength and withstand harsh environment. The interface between the gelcoat and laminate composite is similarly imperative in deciding the mechanical performance of the composite by controls the reintroduction of stress into component. There are no specified standard to verified that how much gel-coat thickness required to produce certain product since mostly research only focus on the enhancement of composite orientation and fiber combination. The aim of this review is to gain an in depth understanding of exactly the effect of gel-coat thickness on laminate composite structure and strength
Keywords: Gelcoat, Thickness, Protection, Laminated, Composite.
A Novel Automated Approach for Offline Signature Verification Based on Shape ...Editor IJCATR
The handwritten signature has been the most natural and long lasting authentication scheme in which a person draw some
pattern of lines or writes his name in a different style. The signature recognition and verification are a behavioural biometric and is
very challenging due to the variation that can occur in person’s signature because of age, illness, and emotional state of the person. As
far as the representation of the signature is concerned a classical technique of thinning or skeleton is mostly used. In this paper, we
proposed a new methodology for signature verification that uses structural information and original strokes instead of skeleton or
thinned version to analyse the signature and verify. The approach is based on sketching a fixed size grid over the signatures and getting
2-Dimensional unique templates which are then compared and matched to verify a query signature as genuine or forged. To compute
the similarity score between two signature’s grids, we follow template matching rule and the Signature grid’s cell are mapped and
matched with respect to position. The proposed framework is fast and highly accurate with reduce false acceptance rate and false
Fingerprint Recognition Using Minutiae Based and Discrete Wavelet TransformAM Publications
Fingerprint recognition is one of the methods used in biometric system. Most of the biometric systems which are used for human identification or person’s identification. In this paper we are discussing minutiae matching and discrete wavelet transform and comparison of these two in fingerprint recognition. In this paper, firstly it uses fingerprint identification and performance in terms of equal error rate and then by calculating using discrete wavelet transform. The main aim of this paper is to create performing and accurate program for fingerprint identification.
Source printer identification using convolutional neural network and transfer...IAESIJAI
In recent years, Source printer identification has become increasingly important for detecting forged documents. A printer's distinguishing feature is its fingerprints. Each printer has a unique collection of fingerprints on every printed page. A model for identifying the source printer and classifying the questioned document into one of the printer classes is provided by source printer identification. A paper proposes a new approach that trains three different approaches on the dataset to choose the more accurate model for determining the printer's source. In the first, some pre-trained models are used as feature extractors, and support vector machine (SVM) is used to classify the generated features. In the second, we construct a two-dimensional convolutional neural network (2D-CNN) to address the source printer identification (SPI) problem. Instead of SoftMax, 2D-CNN is employed for feature extractors and SVM as a classifier. This approach obtains 93.75% 98.5% accuracy for 2D-CNN-SVM in the experiments. The SVM classifier enhanced the 2D-CNN accuracy by roughly 5% over the initial configuration. Finally, we adjusted 13 already-pre-trained CNN architectures using the dataset. Among the 13 pre-trained CNN models, DarkNet-19 has the greatest accuracy of 99.2 %. On the same dataset, the suggested approaches achieve well in terms of classification accuracy than the other recently released algorithms.
Similar to OFFLINE HANDWRITTEN SIGNATURE RECOGNITION USING EDGE HINGE AND EDGE EXTRACTION TECHNIQUES AND MANHATTAN DISTANCE CLASSIFIER (20)
Submission Deadline: 30th September 2022
Acceptance Notification: Within Three Days’ time period
Online Publication: Within 24 Hrs. time Period
Expected Date of Dispatch of Printed Journal: 5th October 2022
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
White layer thickness (WLT) formed and surface roughness in wire electric discharge turning (WEDT) of tungsten carbide composite has been made to model through response surface methodology (RSM). A Taguchi’s standard Design of experiments involving five input variables with three levels has been employed to establish a mathematical model between input parameters and responses. Percentage of cobalt content, spindle speed, Pulse on-time, wire feed and pulse off-time were changed during the experimental tests based on the Taguchi’s orthogonal array L27 (3^13). Analysis of variance (ANOVA) revealed that the mathematical models obtained can adequately describe performance within the parameters of the factors considered. There was a good agreement between the experimental and predicted values in this study.
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
The study explores the reasons for a transgender to become entrepreneurs. In this study transgender entrepreneur was taken as independent variable and reasons to become as dependent variable. Data were collected through a structured questionnaire containing a five point Likert Scale. The study examined the data of 30 transgender entrepreneurs in Salem Municipal Corporation of Tamil Nadu State, India. Simple Random sampling technique was used. Garrett Ranking Technique (Percentile Position, Mean Scores) was used as the analysis for the present study to identify the top 13 stimulus factors for establishment of trans entrepreneurial venture. Economic advancement of a nation is governed upon the upshot of a resolute entrepreneurial doings. The conception of entrepreneurship has stretched and materialized to the socially deflated uncharted sections of transgender community. Presently transgenders have smashed their stereotypes and are making recent headlines of achievements in various fields of our Indian society. The trans-community is gradually being observed in a new light and has been trying to achieve prospective growth in entrepreneurship. The findings of the research revealed that the optimistic changes are taking place to change affirmative societal outlook of the transgender for entrepreneurial ventureship. It also laid emphasis on other transgenders to renovate their traditional living. The paper also highlights that legislators, supervisory body should endorse an impartial canons and reforms in Tamil Nadu Transgender Welfare Board Association.
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
Since ages gender difference is always a debatable theme whether caused by nature, evolution or environment. The birth of a transgender is dreadful not only for the child but also for their parents. The pain of living in the wrong physique and treated as second class victimized citizen is outrageous and fully harboured with vicious baseless negative scruples. For so long, social exclusion had perpetuated inequality and deprivation experiencing ingrained malign stigma and besieged victims of crime or violence across their life spans. They are pushed into the murky way of life with a source of eternal disgust, bereft sexual potency and perennial fear. Although they are highly visible but very little is known about them. The common public needs to comprehend the ravaged arrogance on these insensitive souls and assist in integrating them into the mainstream by offering equal opportunity, treat with humanity and respect their dignity. Entrepreneurship in the current age is endorsing the gender fairness movement. Unstable careers and economic inadequacy had inclined one of the gender variant people called Transgender to become entrepreneurs. These tiny budding entrepreneurs resulted in economic transition by means of employment, free from the clutches of stereotype jobs, raised standard of living and handful of financial empowerment. Besides all these inhibitions, they were able to witness a platform for skill set development that ignited them to enter into entrepreneurial domain. This paper epitomizes skill sets involved in trans-entrepreneurs of Thoothukudi Municipal Corporation of Tamil Nadu State and is a groundbreaking determination to sightsee various skills incorporated and the impact on entrepreneurship.
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
The banking and financial services industries are experiencing increased technology penetration. Among them, the banking industry has made technological advancements to better serve the general populace. The economy focused on transforming the banking sector's system into a cashless, paperless, and faceless one. The researcher wants to evaluate the user's intention for utilising a mobile banking application. The study also examines the variables affecting the user's behaviour intention when selecting specific applications for financial transactions. The researcher employed a well-structured questionnaire and a descriptive study methodology to gather the respondents' primary data utilising the snowball sampling technique. The study includes variables like performance expectations, effort expectations, social impact, enabling circumstances, and perceived risk. Each of the aforementioned variables has a major impact on how users utilise mobile banking applications. The outcome will assist the service provider in comprehending the user's history with mobile banking applications.
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
Technology upgradation in banking sector took the economy to view that payment mode towards online transactions using mobile applications. This system enabled connectivity between banks, Merchant and user in a convenient mode. there are various applications used for online transactions such as Google pay, Paytm, freecharge, mobikiwi, oxygen, phonepe and so on and it also includes mobile banking applications. The study aimed at evaluating the predilection of the user in adopting digital transaction. The study is descriptive in nature. The researcher used random sample techniques to collect the data. The findings reveal that mobile applications differ with the quality of service rendered by Gpay and Phonepe. The researcher suggest the Phonepe application should focus on implementing the application should be user friendly interface and Gpay on motivating the users to feel the importance of request for money and modes of payments in the application.
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
The prototype of a voice-based ATM for visually impaired using Arduino is to help people who are blind. This uses RFID cards which contain users fingerprint encrypted on it and interacts with the users through voice commands. ATM operates when sensor detects the presence of one person in the cabin. After scanning the RFID card, it will ask to select the mode like –normal or blind. User can select the respective mode through voice input, if blind mode is selected the balance check or cash withdraw can be done through voice input. Normal mode procedure is same as the existing ATM.
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
There is increasing acceptability of emotional intelligence as a major factor in personality assessment and effective human resource management. Emotional intelligence as the ability to build capacity, empathize, co-operate, motivate and develop others cannot be divorced from both effective performance and human resource management systems. The human person is crucial in defining organizational leadership and fortunes in terms of challenges and opportunities and walking across both multinational and bilateral relationships. The growing complexity of the business world requires a great deal of self-confidence, integrity, communication, conflict and diversity management to keep the global enterprise within the paths of productivity and sustainability. Using the exploratory research design and 255 participants the result of this original study indicates strong positive correlation between emotional intelligence and effective human resource management. The paper offers suggestions on further studies between emotional intelligence and human capital development and recommends for conflict management as an integral part of effective human resource management.
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
Our life journey, in general, is closely defined by the way we understand the meaning of why we coexist and deal with its challenges. As we develop the "inspiration economy", we could say that nearly all of the challenges we have faced are opportunities that help us to discover the rest of our journey. In this note paper, we explore how being faced with the opportunity of being a close carer for an aging parent with dementia brought intangible discoveries that changed our insight of the meaning of the rest of our life journey.
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
The main objective of this study is to analyze the impact of aspects of Organizational Culture on the Effectiveness of the Performance Management System (PMS) in the Health Care Organization at Thanjavur. Organizational Culture and PMS play a crucial role in present-day organizations in achieving their objectives. PMS needs employees’ cooperation to achieve its intended objectives. Employees' cooperation depends upon the organization’s culture. The present study uses exploratory research to examine the relationship between the Organization's culture and the Effectiveness of the Performance Management System. The study uses a Structured Questionnaire to collect the primary data. For this study, Thirty-six non-clinical employees were selected from twelve randomly selected Health Care organizations at Thanjavur. Thirty-two fully completed questionnaires were received.
Living in 21st century in itself reminds all of us the necessity of police and its administration. As more and more we are entering into the modern society and culture, the more we require the services of the so called ‘Khaki Worthy’ men i.e., the police personnel. Whether we talk of Indian police or the other nation’s police, they all have the same recognition as they have in India. But as already mentioned, their services and requirements are different after the like 26th November, 2008 incidents, where they without saving their own lives has sacrificed themselves without any hitch and without caring about their respective family members and wards. In other words, they are like our heroes and mentors who can guide us from the darkness of fear, militancy, corruption and other dark sides of life and so on. Now the question arises, if Gandhi would have been alive today, what would have been his reaction/opinion to the police and its functioning? Would he have some thing different in his mind now what he had been in his mind before the partition or would he be going to start some Satyagraha in the form of some improvement in the functioning of the police administration? Really these questions or rather night mares can come to any one’s mind, when there is too much confusion is prevailing in our minds, when there is too much corruption in the society and when the polices working is also in the questioning because of one or the other case throughout the India. It is matter of great concern that we have to thing over our administration and our practical approach because the police personals are also like us, they are part and parcel of our society and among one of us, so why we all are pin pointing towards them.
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
The goal of this study was to see how talent management affected employee retention in the selected IT organizations in Chennai. The fundamental issue was the difficulty to attract, hire, and retain talented personnel who perform well and the gap between supply and demand of talent acquisition and retaining them within the firms. The study's main goals were to determine the impact of talent management on employee retention in IT companies in Chennai, investigate talent management strategies that IT companies could use to improve talent acquisition, performance management, career planning and formulate retention strategies that the IT firms could use. The respondents were given a structured close-ended questionnaire with the 5 Point Likert Scale as part of the study's quantitative research design. The target population consisted of 289 IT professionals. The questionnaires were distributed and collected by the researcher directly. The Statistical Package for Social Sciences (SPSS) was used to collect and analyse the questionnaire responses. Hypotheses that were formulated for the various areas of the study were tested using a variety of statistical tests. The key findings of the study suggested that talent management had an impact on employee retention. The studies also found that there is a clear link between the implementation of talent management and retention measures. Management should provide enough training and development for employees, clarify job responsibilities, provide adequate remuneration packages, and recognise employees for exceptional performance.
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
Globally, Millions of dollars were spent by the organizations for employing skilled Information Technology (IT) professionals. It is costly to replace unskilled employees with IT professionals possessing technical skills and competencies that aid in interconnecting the business processes. The organization’s employment tactics were forced to alter by globalization along with technological innovations as they consistently diminish to remain lean, outsource to concentrate on core competencies along with restructuring/reallocate personnel to gather efficiency. As other jobs, organizations or professions have become reasonably more appropriate in a shifting employment landscape, the above alterations trigger both involuntary as well as voluntary turnover. The employee view on jobs is also afflicted by the COVID-19 pandemic along with the employee-driven labour market. So, having effective strategies is necessary to tackle the withdrawal rate of employees. By associating Emotional Intelligence (EI) along with Talent Management (TM) in the IT industry, the rise in attrition rate was analyzed in this study. Only 303 respondents were collected out of 350 participants to whom questionnaires were distributed. From the employees of IT organizations located in Bangalore (India), the data were congregated. A simple random sampling methodology was employed to congregate data as of the respondents. Generating the hypothesis along with testing is eventuated. The effect of EI and TM along with regression analysis between TM and EI was analyzed. The outcomes indicated that employee and Organizational Performance (OP) were elevated by effective EI along with TM.
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
By implementing talent management strategy, organizations would have the option to retain their skilled professionals while additionally working on their overall performance. It is the course of appropriately utilizing the ideal individuals, setting them up for future top positions, exploring and dealing with their performance, and holding them back from leaving the organization. It is employee performance that determines the success of every organization. The firm quickly obtains an upper hand over its rivals in the event that its employees having particular skills that cannot be duplicated by the competitors. Thus, firms are centred on creating successful talent management practices and processes to deal with the unique human resources. Firms are additionally endeavouring to keep their top/key staff since on the off chance that they leave; the whole store of information leaves the firm's hands. The study's objective was to determine the impact of talent management on organizational performance among the selected IT organizations in Chennai. The study recommends that talent management limitedly affects performance. On the off chance that this talent is appropriately management and implemented properly, organizations might benefit as much as possible from their maintained assets to support development and productivity, both monetarily and non-monetarily.
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
Banking regulations act of India, 1949 defines banking as “acceptance of deposits for the purpose of lending or investment from the public, repayment on demand or otherwise and withdrawable through cheques, drafts order or otherwise”, the major participants of the Indian financial system are commercial banks, the financial institution encompassing term lending institutions. Investments institutions, specialized financial institution and the state level development banks, non banking financial companies (NBFC) and other market intermediaries such has the stock brokers and money lenders are among the oldest of the certain variants of NBFC and the oldest market participants. The asset quality of banks is one of the most important indicators of their financial health. The Indian banking sector has been facing severe problems of increasing Non- Performing Assets (NPAs). The NPAs growth directly and indirectly affects the quality of assets and profitability of banks. It also shows the efficiency of banks credit risk management and the recovery effectiveness. NPA do not generate any income, whereas, the bank is required to make provisions for such as assets that why is a double edge weapon. This paper outlines the concept of quality of bank loans of different types like Housing, Agriculture and MSME loans in state Haryana of selected public and private sector banks. This study is highlighting problems associated with the role of commercial bank in financing Small and Medium Scale Enterprises (SME). The overall objective of the research was to assess the effect of the financing provisions existing for the setting up and operations of MSMEs in the country and to generate recommendations for more robust financing mechanisms for successful operation of the MSMEs, in turn understanding the impact of MSME loans on financial institutions due to NPA. There are many research conducted on the topic of Non- Performing Assets (NPA) Management, concerning particular bank, comparative study of public and private banks etc. In this paper the researcher is considering the aggregate data of selected public sector and private sector banks and attempts to compare the NPA of Housing, Agriculture and MSME loans in state Haryana of public and private sector banks. The tools used in the study are average and Anova test and variance. The findings reveal that NPA is common problem for both public and private sector banks and is associated with all types of loans either that is housing loans, agriculture loans and loans to SMES. NPAs of both public and private sector banks show the increasing trend. In 2010-11 GNPA of public and private sector were at same level it was 2% but after 2010-11 it increased in many fold and at present there is GNPA in some more than 15%. It shows the dark area of Indian banking sector.
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
An experiment conducted in this study found that BaSO4 changed Nylon 6's mechanical properties. By changing the weight ratios, BaSO4 was used to make Nylon 6. This Researcher looked into how hard Nylon-6/BaSO4 composites are and how well they wear. Experiments were done based on Taguchi design L9. Nylon-6/BaSO4 composites can be tested for their hardness number using a Rockwell hardness testing apparatus. On Nylon/BaSO4, the wear behavior was measured by a wear monitor, pinon-disc friction by varying reinforcement, sliding speed, and sliding distance, and the microstructure of the crack surfaces was observed by SEM. This study provides significant contributions to ultimate strength by increasing BaSO4 content up to 16% in the composites, and sliding speed contributes 72.45% to the wear rate
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
The majority of the population in India lives in villages. The village is the back bone of the country. Village or rural industries play an important role in the national economy, particularly in the rural development. Developing the rural economy is one of the key indicators towards a country’s success. Whether it be the need to look after the welfare of the farmers or invest in rural infrastructure, Governments have to ensure that rural development isn’t compromised. The economic development of our country largely depends on the progress of rural areas and the standard of living of rural masses. Village or rural industries play an important role in the national economy, particularly in the rural development. Rural entrepreneurship is based on stimulating local entrepreneurial talent and the subsequent growth of indigenous enterprises. It recognizes opportunity in the rural areas and accelerates a unique blend of resources either inside or outside of agriculture. Rural entrepreneurship brings an economic value to the rural sector by creating new methods of production, new markets, new products and generate employment opportunities thereby ensuring continuous rural development. Social Entrepreneurship has the direct and primary objective of serving the society along with the earning profits. So, social entrepreneurship is different from the economic entrepreneurship as its basic objective is not to earn profits but for providing innovative solutions to meet the society needs which are not taken care by majority of the entrepreneurs as they are in the business for profit making as a sole objective. So, the Social Entrepreneurs have the huge growth potential particularly in the developing countries like India where we have huge societal disparities in terms of the financial positions of the population. Still 22 percent of the Indian population is below the poverty line and also there is disparity among the rural & urban population in terms of families living under BPL. 25.7 percent of the rural population & 13.7 percent of the urban population is under BPL which clearly shows the disparity of the poor people in the rural and urban areas. The need to develop social entrepreneurship in agriculture is dictated by a large number of social problems. Such problems include low living standards, unemployment, and social tension. The reasons that led to the emergence of the practice of social entrepreneurship are the above factors. The research problem lays upon disclosing the importance of role of social entrepreneurship in rural development of India. The paper the tendencies of social entrepreneurship in India, to present successful examples of such business for providing recommendations how to improve situation in rural areas in terms of social entrepreneurship development. Indian government has made some steps towards development of social enterprises, social entrepreneurship, and social in- novation, but a lot remains to be improved.
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
Distribution system is a critical link between the electric power distributor and the consumers. Most of the distribution networks commonly used by the electric utility is the radial distribution network. However in this type of network, it has technical issues such as enormous power losses which affect the quality of the supply. Nowadays, the introduction of Distributed Generation (DG) units in the system help improve and support the voltage profile of the network as well as the performance of the system components through power loss mitigation. In this study network reconfiguration was done using two meta-heuristic algorithms Particle Swarm Optimization and Gravitational Search Algorithm (PSO-GSA) to enhance power quality and voltage profile in the system when simultaneously applied with the DG units. Backward/Forward Sweep Method was used in the load flow analysis and simulated using the MATLAB program. Five cases were considered in the Reconfiguration based on the contribution of DG units. The proposed method was tested using IEEE 33 bus system. Based on the results, there was a voltage profile improvement in the system from 0.9038 p.u. to 0.9594 p.u.. The integration of DG in the network also reduced power losses from 210.98 kW to 69.3963 kW. Simulated results are drawn to show the performance of each case.
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
Manufacturing industries have witnessed an outburst in productivity. For productivity improvement manufacturing industries are taking various initiatives by using lean tools and techniques. However, in different manufacturing industries, frugal approach is applied in product design and services as a tool for improvement. Frugal approach contributed to prove less is more and seems indirectly contributing to improve productivity. Hence, there is need to understand status of frugal approach application in manufacturing industries. All manufacturing industries are trying hard and putting continuous efforts for competitive existence. For productivity improvements, manufacturing industries are coming up with different effective and efficient solutions in manufacturing processes and operations. To overcome current challenges, manufacturing industries have started using frugal approach in product design and services. For this study, methodology adopted with both primary and secondary sources of data. For primary source interview and observation technique is used and for secondary source review has done based on available literatures in website, printed magazines, manual etc. An attempt has made for understanding application of frugal approach with the study of manufacturing industry project. Manufacturing industry selected for this project study is Mahindra and Mahindra Ltd. This paper will help researcher to find the connections between the two concepts productivity improvement and frugal approach. This paper will help to understand significance of frugal approach for productivity improvement in manufacturing industry. This will also help to understand current scenario of frugal approach in manufacturing industry. In manufacturing industries various process are involved to deliver the final product. In the process of converting input in to output through manufacturing process productivity plays very critical role. Hence this study will help to evolve status of frugal approach in productivity improvement programme. The notion of frugal can be viewed as an approach towards productivity improvement in manufacturing industries.
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
In this paper, we investigated a queuing model of fuzzy environment-based a multiple channel queuing model (M/M/C) ( /FCFS) and study its performance under realistic conditions. It applies a nonagonal fuzzy number to analyse the relevant performance of a multiple channel queuing model (M/M/C) ( /FCFS). Based on the sub interval average ranking method for nonagonal fuzzy number, we convert fuzzy number to crisp one. Numerical results reveal that the efficiency of this method. Intuitively, the fuzzy environment adapts well to a multiple channel queuing models (M/M/C) ( /FCFS) are very well.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Immunizing Image Classifiers Against Localized Adversary Attacksgerogepatton
This paper addresses the vulnerability of deep learning models, particularly convolutional neural networks
(CNN)s, to adversarial attacks and presents a proactive training technique designed to counter them. We
introduce a novel volumization algorithm, which transforms 2D images into 3D volumetric representations.
When combined with 3D convolution and deep curriculum learning optimization (CLO), itsignificantly improves
the immunity of models against localized universal attacks by up to 40%. We evaluate our proposed approach
using contemporary CNN architectures and the modified Canadian Institute for Advanced Research (CIFAR-10
and CIFAR-100) and ImageNet Large Scale Visual Recognition Challenge (ILSVRC12) datasets, showcasing
accuracy improvements over previous techniques. The results indicate that the combination of the volumetric
input and curriculum learning holds significant promise for mitigating adversarial attacks without necessitating
adversary training.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Water scarcity is the lack of fresh water resources to meet the standard water demand. There are two type of water scarcity. One is physical. The other is economic water scarcity.
2. Padmajadevi G and Dr. Aprameya K.S
http://www.iaeme.com/IJECET/index.asp 2 editor@iaeme.com
1. INTRODUCTION
The issue of manually written mark cheque has been well established in examination group most likely on
account of its different valuable applications in everyday life, for example, cheque extortion recognition,
managing an account exchanges, programmed reserve exchanges, individual recognizable proof, official
courtroom. The online-based mark confirmation frameworks have been appeared to give a somewhat high
accuracy rate since they take quite a bit of advantage of element highlights like increasing speed, speed,
the request of strokes, weight, and constrain data. This dynamic data is gained straightforwardly amid the
written work process utilizing extraordinary electric marking gadgets. In the opposite, the disconnected
from the net based framework gets as the contribution of dark scale on the other hand twofold pictures
which are procured by scanners after the marking procedure has as of now been finished. As no dynamic
data is caught on the mark pictures, the issue of disconnected from the net mark confirmation turns out to
be a great deal more confused. Regardless, the offline based frameworks require no uncommon gadgets for
information securing, and the greater part of the marks are, in day by day life, displayed in the types of
writings, papers or records. In this manner, it draws much of enthusiasm from exploration group to outline
hearty logged off mark cheque frameworks. The issue of programmed logged offline/online written by
hand signature cheque has been well established in examination group likely on account of its different
helpful applications in everyda life, for example, cheque misrepresentation discovery, saving money
exchanges, programmed reserve exchanges, individual ID, courtroom. The online-based mark confirmation
frameworks have been appeared to give a fairly high exactness rate since they take quite a bit of advantage
of element highlights like speeding up, speed, the request of strokes, weight, and compel data. This
dynamic data is procured straightforwardly amid the written work process utilizing unique electric marking
gadgets. In the opposite, the logged off based framework gets as the contribution of dark scale on the other
hand twofold pictures which are obtained by scanners after the marking procedure has as of now been
finished. As no dynamic data is caught on the mark pictures, the issue of disconnected from the net mark
confirmation turns out to be significantly more convoluted. In any case, the offline based frameworks
require no uncommon gadgets for information procurement, and a large portion of the marks are, in
everyday life, introduced in the types of writings, papers or records. Hence, it draws much of enthusiasm
from exploration group to plan hearty disconnected from the net mark cheque frameworks. The vast
majority of the current frameworks take after a general structure of a mark verifier comprising of three
fundamental stages: prepreparing, highlight extraction and grouping [8]. In the first stage, the
commonplace undertakings are mark extraction, commotion expulsion, skew revision, incline adjustment,
size standardization, binarization, skeletonization, and so on. In the second stage, two sorts of elements are
regularly utilized including nearby components (e.g., matrix based elements, pixel-based highlights, nearby
thickness, width/stature proportions, stroke introductions, crossing-focuses) and worldwide highlights
(Fourier-, Irregular, Wavelet-based elements). In the arrangement stage, a classifier could be chosen as a
separation based capacity (e.g., Euclidean, DTW, Mahalanobis) on the other hand a machine-learning-
based model (e.g., GMM,SVM, Well). The yield of this stage is frequently constrained to a twofold choice
(i.e., hard choice). While this paired classification based methodology is somewhat basic in the writing,
late works [3, 12, 16] have demonstrated that such an arrangement of settling on a hard choice is not
reasonable by and by in view of the accompanying reasons: It is not the charge of the framework to settle
on a definite conclusion on creation yet the charge of the client (e.g., a courtroom); The framework has no
earlier data about the present situation (i.e., the earlier likelihood of origin and the expense of making
incorrectly/genuine choice); The errand of selecting a decent limit for settling on choice is not trifling;
Expansion of the computational challenges on the off chance that one needs to consolidate the yield of
various biometric frameworks together (e.g., DNA-, Face-,Unique mark , Discourse based frameworks).
These certainties persuaded us to build up a disconnected from the net mark cheque framework whose
fundamental target is to give the client two yields: a proof score assessed from the info designs and the
level of assurance of finding that score. This kind of methodology alludes to the structure of settling on
delicate choice, as said in [16], and the framework is considered as a criminological penmanship master
that he looks at the info designs (e.g., commonly including one doubted signature and an arrangement of
3. Offline Handwritten Signature Recognition Using Edge hinge and Edge extraction Techniques and Manhattan
Distance Classifier
http://www.iaeme.com/IJECET/index.asp 3 editor@iaeme.com
real marks from a reference author) by means of two inverse speculations H0 and H1 expressed as takes
after.
Figure 1 Original Speciman
Figure 2 Forgery Speciman
1) Speculation H0: The addressed mark is a bona fide one
2) Speculation H1: The addressed mark is a fabrication one
2. RELATED WORK
In this area, we quickly survey the primary methodologies for logged off written by hand signature cheque
and primarily concentrate on the phases of highlight extraction and order. These methodologies can be
sorted into two classes:
Worldwide and nearby methodologies. For the previous approaches, the creators in [8] introduced two
techniques devoted to highlight extraction. In the first place technique tracks the positional variety of the
vertical projection profiles of the mark and afterward utilizes the dynamic time wrapping (DTW)
procedure for coordinating. The second strategy measures the positional variety of individual strokes of the
mark. In both the strategies, Mahalanobis separation is utilized for the errand of arrangement. In [20], two
new strategies were displayed to remove the 1D signature highlights, in particular most extreme Length
Vertical Projection (MLVP) and Least Length Even Projection (MLHP). Both the strategies include in
turning the mark by an edge to make it revolution invariant. This was proficient by inspecting the edge in
the scope of [300, 300] and finding the point which relates to the most extreme (resp. least) length of the
vertical (resp. level) projection of the mark. The relating point is then used to adjust the mark. Next, the
vertical and even projections of the adjusted mark are treated as 1D feature, followed by afurther process
of size normalization using the length of the vertical projection. Signature coordinating and grouping is at
long last finished utilizing a broadened DTW procedure. Trial results, connected to their own datasets,
appeared fascinating results. For the above methodologies, the real confinements are taking after. Initially,
it is constrained to the little scope of mark revolution. Second, measure standardization procedure is
exceptionally delicate to clamor subsequent to the length of the vertical projection can be very diverse on
the off chance that some expansion objects (e.g., ink, blobs, and clamor) are nearness in the mark. At long
last, the utilization of vertical furthermore, flat projections as 1D elements is not adequately unmistakable
for segregating very comparable marks in which one of them could be made by an alternate author. Other
DTW-based methodologies that utilize the worldwide elements (e.g., Radon Change, Wavelet
examination) have been displayed. In synopsis, despite the fact that various systems have been completed
to manage the issue of disconnected from the net manually written mark cheque, it is untimely to infer that
4. Padmajadevi G and Dr. Aprameya K.S
http://www.iaeme.com/IJECET/index.asp 4 editor@iaeme.com
the answer for this issue was finished. While signature highlight is a significant point prompting the
accomplishment of a disconnected from the net mark cheque, it appears that the leaving strategies utilized
entirely basic components. These strategies are not adequately particular, are touchy to scaling change, and
are incompletely invariant to turn change. Execution of these frameworks is exceptionally reliant on the
key stride of pre-preparing like commotion expulsion. Advance more, the existing techniques regularly
report the outcomes all alone datasets with a constrained correlation with different techniques. As the
objective of their trials is fundamentally worried with the sole motivation behind demonstrating the
exceptional aftereffects of the proposed technique, such an assessment convention is excessively subjective
and the genuine execution is not correctly assessed. Moreover, the majority of these techniques are keen on
settling on a simply double choice, which was known not a few disadvantages as said some time recently.
3. PROPOSED APPROACH
These certainties persuaded us to build up a disconnected from the net mark check framework whose
fundamental target is to give the client two yields: a proof score assessed from the info designs and the
level of assurance of finding that score. This kind of methodology alludes to the structure of settling on
delicate choice, as said in [16], and the framework is considered as a criminological penmanship master
that he looks at the info designs (e.g., commonly including one doubted signature and an arrangement of
real marks from a reference author) by means of two inverse speculations H0 and H1 expressed as takes
after. The proposed approach works with dark scale pictures. The info pictures are first experienced some
pre-handling steps including binarization, skeletonization, and testing. The Otsu strategy [12] is chosen for
the binarization venture as it is all around adjusted to the signature pictures which regularly contain two
predominant dimension levels relating to the mark content (i.e., frontal area) and the foundation.
Regardless, this binarization step will cause the loss of subtle element data. For instance, the dimension
levels in the mark pretty much uncover the weight and drive data of the composition procedure. These
lines misuse the skeleton-based elements for just the reason for extracting the worldwide components. The
subtle element data in the dark scale picture is still abused when figuring the nearby features. Starting from
the parallel mark picture, the skeleton of the mark is removed utilizing the strategy. This method permits
us to gauge the nearby line thickness at every skeleton point that we will utilize this quality as the scale
parameter for registering the neighbourhood highlights. The last pre-preparing step is testing. To pick up
time proficiency while applying the shape setting descriptor, the skeleton of a mark is consistently tested
yielding an arrangement of N test focuses. Every specimen point is then described by two parameters: the
area of the point and the nearby scale figured as the like thickness now. Just the specimen focuses are
considered to process the shape connection highlights and the nearby elements in the consequent stages.
4. METHODOLGY
The information acquistion is an imperative assignment in Signature Sample acknowledgment. With a
specific end goal to procure an adequate information we have been gathered the characters and filtered
utilizing scanner of determination 300 dpi. An aggregate of 1000 JPEG Signature Tests from 75 different
journalists of 100 words for each are acquired and put away in database for further examination.
4.1. Preprocessing
In pre-processing stages we did noise removal, binarization, edge detection and thinning operations are
performed on characters for better enhancement
4.2. Segmentation
The scanned handwritten Signature Samples are segmented into individual Signature Samples by using the
edge pixels technique and later each Signature Samples are combined into separate folders for separate
Signature Samples, where in each folder we have stored 100 samples for testing purpose totally 100 folders
of all Signature Samples.
5. Offline Handwritten Signature Recognition Using Edge hinge and Edge extraction Techniques and Manhattan
Distance Classifier
http://www.iaeme.com/IJECET/index.asp 5 editor@iaeme.com
5. FEATURE EXTRACTION
Feature extraction plays a vital role in improving the classification effectiveness and computational
efficiency. A. Edge Direction Distribution. The initial step, we distinguished the edge of the paired picture
utilizing Sobel Location method. These edge identified picture are checked utilizing 8 associated pixel
neighbourhood. After this the quantity of lines and segments in a paired picture is discovered utilizing size
function. Now the primary dark spot pixel in an picture is recognized and this pixel is considered as focus
pixel of the square neighbourhood. Next we checked the dark edge utilizing the coherent and administrator
as a part of all bearing beginning from the middle pixel and completion in any of the edge in square. To
maintain a strategic distance from the excess the upper two quadrants in the area is checked and it is hard
to distinguish the bearing of Signature Sample composed along the edge part. This will give the”n”
conceivable points. These confirmed edges of every pixel are numbered into n-paired histogram which is
then standardized to a likelihood circulation which gives the probability of an edge section situated in the
picture at the point measured from the level.
6. EDGE HINGE DISTRIBUTION
This system is helpful to distinguish the shape of the unmistakable styles from various journalists which is
ascertained with the assistance of neighbourhood edges along the edges. The Edge pivot feature considers
two edge pieces rising up out of focus pixel and join probability dispersion of introductions of two pieces
of a ”pivot” are ascertained. The Standardized histogram gives the joint likelihood dispersion for”pivoted”
edge pieces situated at the edges 1 and 2. The introduction is checked in 16 headings for a solitary edge.
Here we consider just the aggregate number of blends of two points of non-repetitive qualities and the
basic consummation pixels are killed.
7. FEATURE SELECTION
In this we made the classification based on Collective Characters Feature Selection. The agenda we took to
test, against zero, the difference µ1 and µ2 between the means of the values taken by a feature in two
classes. Let us take Class1 were
Table I Significance of Degrees of Freedom
X_ i, i=1,2,....,N, be the sample values of the feature in class ᵠ1 with µ1: Likewise, for Class2 were ᵠ2 we
shall take y i, i=1,2....,N with mean µ2: For our assumption the variance of the feature values is the same in
both classes σ2
_i= σ2
_i= σ2
For the purpose of closeness of two mean values, hypothesis test was carried
out
H_1: ∂µ=µ1-µ2#0
H_0: ∂µ=µ1-µ2=0
here x,y denote the random variables corresponding to the values of the feature in the two classes ᵠ1,ᵠ2
were statistical independence has been assumed. Likwise E[z]=µ1-µ2 and due to the independence
6. Padmajadevi G and Dr. Aprameya K.S
http://www.iaeme.com/IJECET/index.asp 6 editor@iaeme.com
assumption σ2
–x=2σ2
We took the similar arguments were we used before, now we have this formula
given below.
and the known variance case z follows the normal
distribution for large N. In the table1 the values used to decide about the equation
If the variance is not known, then we choose the test static
Where
From this we can show that follows a chi-square distribution with 2N-2 degrees of
freedom.
7.1. Run Length Distribution
This run length circulation is utilized to decide on binarized pictures by thinking about of dark pixel which
is continuos on closer view or white pixel which is coordinating to foundation. The filtering methods are
two sorts: Flat & Vertical. In the Flat the lines of the picture and in the Vertical the section of the picture is
considered. Later the likelihood circulation is translated by utilizing the standardized histogram of run
lengths. The Orthogonal data to the directional components is acquired by utilizing the run lengths.
7.2. Length
The aggregate length of the every Signature Sample is distinguished in every section in the twofold picture
to locate the first and last pixels in the picture and store their segment number. At last discover the length
of the picture is computed by subtracting the section number of the last pixel to the segment number of the
primary pixel.
7.3. Height
The Tallness of the every Signature Sample is recognized continuously at every column in the parallel
picture. The first and the last pixels of the picture are found and the corresponding column numbers are put
away. At long last the tallness of the picture is computed by subtracting from the column number of last
pixel to the line number of first pixel.
7. Offline Handwritten Signature Recognition Using Edge hinge and Edge extraction Techniques and Manhattan
Distance Classifier
http://www.iaeme.com/IJECET/index.asp 7 editor@iaeme.com
1) Height from baseline to upper edge: By this system, we ascertained the tallness of the Signature
Sample from benchmark to upper edge is figured by deciding the gauge position of the Signature Sample.
This is finished by throwing an exhibit capacity, here the list is column number in the
Signature Sample. Next the quantity of dark pixels in every column is calculated and the outcomes are put
away in exhibit. At long last the whole Signature Sample, the most extreme estimation of the exhibit is
perceived and the corresponding grow number is put away as the basline. The length of the signature
sample from the benchmark to the upper edge is figured by subtracting the line number of first pixel in the
picture from its column number of the pattern.
2) Height from baseline to lower edge: By this strategy the tallness of the paired Signature Sample from
the pattern to the lower edge is controlled by ascertaining the gauge line number.
Next the line number of the last pixel of the Signature Sample is considered. The tallness of the picture
from the pattern to the lower edge is ascertained by subtracting the last pixel line number to the benchmark
line number.
8. CLASSIFIERS
For this experiment we used the Manhattan distance classifier & Euclidian Classifier. To calculate the
variation of different angles this classifiers is very powerful. For assumption Equi probable classes with the
same covariance matrix, g_x with the equation as shown below
where constants have been neglected. ∑=σ2
I : In this case maximum g i (x) implies minimum.
Euclidean distance: d _ε = || x_µi ||. Thus featue vectors are asigned to classes according to their Euclidean
distance from the respective mean points.
9. CONCLUSION AND FUTURE ENCHANCEMENT
The endeavor has been made to actualize Signature Test utilizing edge-based element that portrays the
adjustments in course attempted amid the written by hand Signature Tests by clients. It performs superior
to anything the various assessed highlights. Our test outcomes demonstrate that the best performing
highlights when a lot of content is accessible, to perform best contrasted with the others when little content
is accessible, not with standing or having significantly higher measurement. The outcomes reported here,
in view of a spotless information set, have a scholarly significance with regards to the handiness of various
components and they don’t completely address issues like size invariance, non-uniform foundation, and
debased records. The next future exploration of interest will be concentrating on decreasing the
dimensionality of the element vectors, and yet keeping their oppressive force on further enhancing
execution by consolidating diverse components with a specific end goal to abuse their in born level of
orthogonally.
10. RESULTS OBTAINED
Figure 3 Input with noise
8. Padmajadevi G and Dr. Aprameya K.S
http://www.iaeme.com/IJECET/index.asp 8 editor@iaeme.com
Figure 4 Noise removed
Figure 5 Sobel operator specimen
Figure 6 Conture Speciman
Figure 7 X-stats
Figure 8 Imgoriginal datasets
9. Offline Handwritten Signature Recognition Using Edge hinge and Edge extraction Techniques and Manhattan
Distance Classifier
http://www.iaeme.com/IJECET/index.asp 9 editor@iaeme.com
Figure 9 Exact Matched Recognized ID Result
Figure 10 Path of the Exact Match Recognized ID Result opened in notepad
REFERENCES
[1] Belongie, S., Malik, J., Puzicha, J.: Shape matching and object recognition using shape contexts. IEEE
Trans. Pattern Anal. Mach. Intell.24(24), 509522 (2002).
[2] Blumenstein, M., Liu, X.Y., Verma, B.: A modified direction feature for cursive character
recognition.In: Proceedings of 2004 IEEE International Joint Conference on Neural Networks, vol. 4,
pp. 29832987 (2004)
[3] Brummer, N., Preez, J.d.: Application-independent evaluation of speaker detection. Computer Speech
and Language 20(2), 230275 (2006)
[4] Deng, P.S., Liao, H.-Y.M., Ho, C.W., Tyan, H.-R.: Wavelet-based off-line handwritten signature
verification. Comput. Vis. Image Underst. 76(3),173190 (1999)
[5] di Baja, G.S.: Well-shaped, stable, and reversible skeletons from the (3,4)-distance transform. J. Visual
Comm. and Image Representation 5(1), 107115 (1994)
[6] El-Yacoubi, A., El Yacoubi, A., Bortolozzi, F., Sabourin, R.: An offline signature verification system
using hidden markov model and cross-validation. In: Proceedings of the 13th Brazilian Symposium on
Computer Graphics and Image Processing, pp. 105112 (2000).
[7] Fang, B., Leung, C.H., Tang, Y.Y., Kwok, P.C.K., Tse, K.W., Wong, Y.K.: Offline signature
verification with generated training samples. IEE Proceedings of Vision, Image and Signal Processing
149(2), 8590 (2002).
[8] Fang, B., Leung, C.H., Tang, Y.Y., Tse, K.W., Kwok, P.C.K., Wong, Y.K.: Offline signature
verification by the tracking of featute and stroke positions. Pattern Recog. 36(1), 91101 (2003)
[9] Fang, B.,Wang, Y.Y., Leung, C.H., TSE, K.W., Tang, Y.Y., Kwok, P.C.K.,Wong, Y.K.: Offline
signature verification by the analysis of cursive strokes. Int. J. Pattern Recognit. Artif. Intell. 15(4),
659673 (2001)
[10] Fischler, M.A., Bolles, R.C.: Random sample consensus: a paradigm for model fitting with applications
to image analysis and automated cartography. Communication ACM 24(6), 381395 (1981)
[11] Gilperez, A., Alonso-Fernandez, F., Pecharroman, S., Fierrez, J., Ortega-Garcia, J.: Off-line signature
verification using contour features. In: Proceedings of the 11th International Conference on Frontiers in
Handwriting Recognition (2008)
10. Padmajadevi G and Dr. Aprameya K.S
http://www.iaeme.com/IJECET/index.asp 10 editor@iaeme.com
[12] Gonzalez-Rodriguez, J., Fierrez-Aguilar, J., Ramos-Castro, D., OrtegaGarcia, J.: Bayesian analysis of
fingerprint, face and signature evidences with automatic biometric systems. Forensic Sci. Int. 155(2),
126140 (2005)
[13] Impedovo, D., Pirlo, G.: Automatic signature verification: The state of the art. IEEE Transactions on
Systems, Man, and Cybernetics, Part C: Applications and Reviews 38(5), 609635 (2008)
[14] Jena, D., Majhi, B., Panigrahy, S.K., Jena, S.K.: Improved offline signature verification scheme using
feature point extraction method.In: Proceedings of the 7th IEEE International Conference on Cognitive
Informatics, pp. 475480 (2008)
[15] Jonker, R., Volgenant, A.: A shortest augmenting path algorithm for dense and sparse linear assignment
problems. Computing 38(4), 325340(1987)
[16] Dr. Vangala Padmaja, A Brief Review on Hand Written Character Recognition, International Journal of
Advanced Research in Engineering and Technology (IJARET), 5(2), 2014, pp. 70–78.
[17] Manju and Abhishek Bhatnagar. Application of Speech with Their Analysis about Recognition.
International Journal of Computer Engineering and Technology (IJCET), 6(10), 2015, pp. 66-80.