Human Identification using Iris Recognition
Iris recognition is an invasive biometric technique used to identify human being. Iris is defined as annular region between pupil and sclera of human eye which exhibits extraordinary texture that is unique for each individual. Hence, imposes various challenges in accurate iris segmentation and feature extraction techniques to provide many opportunities for researchers in pursuing their research work in this area. This paper presents a study about different techniques used previously for iris recognition.
Published by: Geetanjali Sharma, Neerav Mehan
Author: Geetanjali Sharma
Paper ID: V2I3-1163
Paper Status: published
Published: June 6, 2016
Palm Print: A Bio-Metric for Human Identification
As in today’s life security is main concern. So, a lot of researches are going in the field of security like password, security question, pattern matching and a very important approach is biometric security. So my work is to study about the palm print recognition to identify human. Palm print recognition system has proved its efficiency with many machine learning techniques like LBP, Repeated line tracking, junctions point matching. This paper is a comparison of different techniques. Previous research on palm print shows that palm codes from different palms are similar, with 〖45〗^°streaks.
Published by: Kalyani, Sunil Pathania
Author: Kalyani
Paper ID: V2I3-1162
Paper Status: published
Published: June 6, 2016
An Analytical Study on Forecasting Model with Special Attention to Gold Price
A commodity with resonance is Gold. Gold is used as currency over the centuries. Gold is unique in nature due to its capability of being hedge in opposition to inflation. It has strong stability to withstand in financial crises and volatility. Although the social esteem that the gold business adds to social orders far and wide, particularly in poorer nations, is less apprehended and frequently distorted. As of late, the worldwide gold cost pattern has pulled in a great deal of consideration and the cost of gold has unnerving spike contrasted with recorded pattern. In times of vulnerability financial specialists consider gold as a fence against unexpected debacles so the fore-casted price of gold has been a subject of most elevated among all. In this research the primary focal area for examination is to add to a determining model for gold price in which this will be done through Box-Jenkins, ARIMA (Auto regressive Integrated Moving Average) and time series analysis model of forecasting. The main objective of this research is to investigate the factors which influencing gold price of the gold market. Data for analysis is collected from variable data sources in order examine the impact and contribution of factors on gold price. Based on identified factors, the gold price will be predicted for upcoming years.
Published by: P .M. Dhanalakshmi, P. R. S. Reddy
Author: P .M. Dhanalakshmi
Paper ID: V2I3-1161
Paper Status: published
Published: June 3, 2016
Optimal 4G and LTE Cellular Tower Placement Strategy
The number of cell phone subscribers is increasing use of cell phones in remote areas and to increase their coverage and to all the places it has sought to expand the network service providers. The cost of placing a cell tower, depending on the height and location, and because it can be very expensive, they have to be placed strategically to reduce the cost. Number of service providers has increased manifold in the last decade and the competition between them is an efficient algorithm for finding a strategic manner is important to place your towers. On such a brilliant connectivity in remote areas as well as extreme at an affordable cost to the service provider can ensure customers. All towers being expensive needs to be placed strategically, to reduce costs. In addition, an optimum height of the tower is to be placed wisely need to be calculated as the height of the tower not only affects the coverage of the tower, but also affects the cost of your appointment. In this context, we come across various complications. For example, the signals to reach some areas as the extent of coverage is distorted due to geographic barriers fail. Thereafter, in any area of potential tower locations to be determined. And only the best and most essential that people in the region are required to cover more and more customers with their respective optimum height is chosen. This can help (FDMA) technology. Manipulating transmission group width, long distance roaming is impossible, and it is merely a congenital mobile contact system
Published by: Rishi Sharma, Er. Anupma Dhamija
Author: Rishi Sharma
Paper ID: V2I3-1160
Paper Status: published
Published: June 3, 2016
Enhanced Integrity Preserving Homomorphic scheme for Cloud Storage
As Cloud Calculating becomes prevalent, extra and extra sensitive data are being centralized into the cloud, such as emails, confidential condition records, confidential videos and photos, firm finance data, power documents, etc. By storing their data into the cloud, the data proprietors can be relieved from the burden of data storage and maintenance so as to relish the on-demand elevated quality data storage service. Though, the fact that data proprietors and cloud server are not in the alike trusted area could locale the our sourced data at chance, as the cloud server could no longer be fully trusted in such a cloud nature due to a number of reasons: the cloud server could leak data data to unauthorized entities or be hacked. It follows that sensitive data normally ought to be encrypted prior to outsourcing for data privacy and combating unsolicited accesses. In cloud computing cloud users and cloud ability providers are nearly precise to be from disparate belief domains. Data protection and privacy are the critical subjects for remote data storage. A safeguard user enforced data admission manipulation mechanism have to be endowed beforehand cloud users have the freedom to outsource sensitive data to the cloud for storage. With the rise of allocating confidential company data on cloud servers, it is imperative to accept an effectual encryption arrangement alongside a fine-grained admission manipulation to encrypt outsourced data. Attribute-based encryption is a area key established encryption that enables admission manipulation above encrypted data employing admission strategies and ascribed attributes. In this work, we are going to scutiny homomorphic schemes for encryption and probable resolutions for their limitations.
Published by: Mashkoor Ahmad Kichloo, Mr. Parikshit Singla
Author: Mashkoor Ahmad Kichloo
Paper ID: V2I3-1159
Paper Status: published
Published: June 3, 2016
Secure Authentication Based Trust Evaluation In VANETS
Trust and its association are thrilling fields of research. The affluent works producing concerning belief gives us a forceful indication that this is a vital span of research. Belief as a believed has a expansive collection of adaptations and requests, that reasons divergence in belief association terminology. The aim of this paper is to furnish VANETs designers alongside several perspectives on the believed of belief, an understanding of the properties that ought to be believed in growing a belief metric, and visions on how belief can be computed. We commenced this paper by giving assorted definitions of belief and metrics utilized for assessing trust. We next gave a comprehensive survey of assorted belief computing ways, their comparisons alongside respect to assorted attack models and computational requirements. We analyzed assorted literatures on the belief dynamics such as belief propagation, aggregation and predictions. In the end we have endowed a serving detailing the request of belief mechanisms in security. The belief schemes gave in this discover cover an expansive scope of request and are established on countless disparate kinds of mechanisms. There is no solitary resolution that will be suitable in all contexts and applications. As arranging a new belief arrangement, it is vital to ponder the constraints and the kind of data that can be utilized as input by the network. A finished observation is that so distant, the continuing scutiny work and propositions lack completeness. There are vital subjects yet to be addressed.
Published by: Meenu Setia, Mrs. Parul Dua
Author: Meenu Setia
Paper ID: V2I3-1158
Paper Status: published
Published: June 3, 2016