Latest Articles - Volume 10 No. 1

  • Control Algorithm to The Semantic D ata Security in Computer Networks

    Khaled Sadeq Al-shredei, Mohamad A. A. Al-Rababah and Nour E. Oweis

    [ View:    Abstract ] [ HTML Full Text]

    In this paper we will talk about information technology semantic , which plays an important role in many areas of human activity and therefore the task of data security semantic is very important for information technology and will consider this research to support the idea of data semantic cards safety of RDF tri- called safety data. Also with the security of confidential data labels in different security levels in different departments have different ranges and variety of use of user data. There are ongoing contacts with the idea of safety data on the labels of three diverse In this research has identified the main rules to control user access to the data by comparing the levels of access to the user ( the security levels triple ) Based on these rules and advanced algorithms will do read and modify data RDF triple.

    Hide Abstract

    Views    PDF Download PDF Downloads: 0
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Iris Biometric Modality: A Review

    Iqra Altaf Mattoo and Parul Agarwal*

    [ View:    Abstract ] [ HTML Full Text]

    Biometric Recognition is the most suitable and informed identification method which is used in different fields due to its uniqueness of the countless behavioural and physiological traits like hand geometry, finger prints, iris recognition, face recognition, handwriting, voice recognition, etc. Iris recognition system is widely being used as it has inherently distinctive patterns that provide a robust method for the identification purpose. Different nations have already started to use biometric recognition system for the identification purposes including patient identification, border security, etc. In this review paper, different steps that are involved in Iris Recognition system are defined and evaluation of different Iris Recognition methods used by different researchers for each recognition step is done as well.

    Hide Abstract

    Views   
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • A Review on IoT Security Issues and Countermeasures

    J. Yashaswini

    [ View:    Abstract ] [ HTML Full Text]

    Internet of things (IoT) is a system of connected physical objects that are accessible through an internet. The things in IoT is an object that assigned with an IP address and have the ability to collect and transfer the data over a network without manual intervention. As IOT does not need any human to machine interaction, it seems to be one of the largest waves of revolution as per the research going on, hence security is needed. The quick development of IOT has derived with the challenges in terms of security of things. This paper focus on the general security issues in IoT and measures used to overcome with those security issues.

    Hide Abstract

    Views   
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • Cellular Automata Based Study of Spectral Signatures of Dal_Lake Infrared Imagery

    Shahi Jahan Wani and Fasel Qadir

    [ View:    Abstract ] [ HTML Full Text]

    Among all the water bodies in Jammu & Kashmir Dal Lake has a peculiar significance due to its location in the heart of the capital city Srinagar. Historical studies over last fifteen hundred years indicate a continuous squeezing of the Lake due to different natural and manmade interventions. Over this long period, the governance of the land has passed through various wise and ugly human plans besides some slow natural processes. The mathematical modelling of such a dynamics is not an easy task because of the many intervening variables and the difficulty which implies their measurements. On the other hand, during the last decades, the use of Cellular Automata (CA) techniques to simulate the behaviour of linear or non-linear systems is becoming of great interest. This fact is mainly due to the fact that this approach depends largely on local relations and a series of rules instead of precise mathematical formulae. The infrared (IR) satellite imagery can be helpful in identifying the different areas of interest using CA as a tool of image processing. The study will not only separate the areas of interest but also pave a way towards a comprehensive study of all the identified zones using spectral signatures received from the continuous IR imagery of both pre-monsoon and post-monsoon periods in future.

    Hide Abstract

    Views   
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone
  • A Novel Approach to Address Sensor Interoperability Using Gabor Filter

    Neha Bhatia1, Himani2 and Chander Kant3

    [ View:    Abstract ] [ HTML Full Text]

    Biometric authentication using fingerprint is one of the unique and reliable method of verification processes. Biometric System suffers a significant loss of performance when the sensor is changed during enrollment and authentication process. In this paper fingerprint sensor interoperability problem is addressed using Gabor filter and classifying images into good and poor quality. Gabor filters play an important role in many application areas for the enhancement of various types of fingerprint images. Gabor filters can remove noise, preserve the real ridges and valley structures, and it is used for fingerprint image enhancement. Experimental results on the FVC2004 databases show improvements of this approach.

    Hide Abstract

    Views   
    Share Knowledge: Share on LinkedInShare on FacebookTweet about this on TwitterShare on Google+Share on RedditEmail this to someone