Showing posts with label Indian Journal. Show all posts
Showing posts with label Indian Journal. Show all posts

Tuesday, November 20, 2018

IJSRD | High Speed Clustering Scheme for High Dimensional Data Streams

Research Aera & Helpful Artile for : Computer Science & Information Technology

Author(s): Sudeesh S, M. Suresh

Institute: SELVAM COLLEGE OF TECHNOLOGY

Keywords: Clustering, Data Stream, High Dimensionality

Abstract:
This paper presents a novel high-speed clustering scheme for high dimensional data streams. Data stream clustering has gained importance in different applications, for example, in network monitoring, intrusion detection, and real-time sensing are few of those. High dimensional stream data is inherently more complex when used for clustering because the evolving nature of the stream data and high dimensionality make it non-trivial. In order to tackle this problem, projected subspace within the high dimensions and limited window sized data per unit of time are used for clustering purpose. We propose a High Speed and Dimensions data stream clustering scheme (HSDStream) which employs exponential moving averages to reduce the size of the memory and speed up the processing of projected subspace data stream. The proposed algorithm has been tested against HDD Stream for cluster purity, memory usage, and the cluster sensitivity. Experimental results have been obtained for corrected KDD intrusion detection dataset. These results show that HSDStream outperforms the HDDStream in performance metrics, especially the memory usage and the processing speed.
Paper ID: IJSRDV5I10658

Published in IJSRD Volume : 5, Issue : 1, April 2017

Download Article

For More Helpful Article or Information please visit:

IJSRD - International Journal for Scientific Research & Development

Thursday, September 27, 2018

Monday, March 26, 2018

#How to write research paper | Publishing Your First #Research Paper

Welcome to IJSRD.

Here we try to explain step by step solutions for how to write research paper.

#YouTube Video :


                                                  
                                                 For More topics refer www.ijsrd.com

Tuesday, August 4, 2015

special issue for Image Processing #IJSRD

Best 25 papers will be published online.Participate in this special issue and get a chance to win the Best Paper Award for Image Processing. Also other authors will have special prizes to be won.


What is Image Processing?
Image processing is a method to convert an image into digital form and perform some operations on it, in order to get an enhanced image or to extract some useful information from it. It is a type of signal dispensation in which input is image, like video frame or photograph and output may be image or characteristics associated with that image. Usually Image Processingsystem includes treating images as two dimensional signals while applying already set signal processing methods to them.
It is among rapidly growing technologies today, with its applications in various aspects of a business. Image Processing forms core research area within engineering and computer science disciplines too.Image processing usually refers to digital image processing, but optical and analog image processing also are possible.
Analog or visual techniques of image processing can be used for the hard copies like printouts and photographs. Image analysts use various fundamentals of interpretation while using these visual techniques. The image processing is not just confined to area that has to be studied but on knowledge of analyst. Association is another important tool in image processing through visual techniques. So analysts apply a combination of personal knowledge and collateral data to image processing.
Digital Processing techniques help in manipulation of the digital images by using computers. As raw data from imaging sensors from satellite platform contains deficiencies. To get over such flaws and to get originality of information, it has to undergo various phases of processing. The three general phases that all types of data have to undergo while using digital technique are Pre- processing, enhancement and display, information extraction.
If you have worked on any part of image processing prepare a research paper and submit to us
Image processing basically includes the following three steps.
  • Importing the image with optical scanner or by digital photography.The acquisition of images (producing the input image in the first place) is referred to as imaging.
  • Analyzing and manipulating the image which includes data compression and image enhancement and spotting patterns that are not to human eyes like satellite photographs.
  • Output is the last stage in which result can be altered image or report that is based on image analysis.

Purpose of Image processing
The purpose of image processing is divided into various groups. They are:
  • Visualization - Observe the objects that are not visible.
  • Image sharpening and restoration - To create a better image.
  • Image retrieval - Seek for the image of interest.
  • Measurement of pattern – Measures various objects in an image.
  • Image Recognition – Distinguish the objects in an image.

Applications of Image processing
Image processing has been an important stream of Research for various fields. Some of the application areas of Image processing are….
Intelligent Transportation Systems – E.g. Automatic Number Plate Recognition, Traffic Sign Recognition
Remote Sensing –E.g.Imaging of earth surfaces using multi Spectral Scanners/Cameras, Techniques to interpret captured images etc.
Object Tracking – E.g. Automated Guided Vehicles, Motion based Tracking, Object Recognition
 Defense surveillance – E.g. Analysis of Spatial Images, Object Distribution Pattern Analysis of Various wings of defense. Earth Imaging using UAV etc.
 Biomedical Imaging & Analysis – E.g. Various Imaging using X- ray, Ultrasound, computer aided tomography (CT) etc. Disease Prediction using acquired images, Digital mammograms.etc.
Automatic Visual Inspection System – E.g.Automatic inspection of incandescent lamp filaments, Automatic surface inspection systems,    Faulty component identification etc.
And many other applications…..
To contribute your research work in Image processing please prepare an article on it and submit to us.

Friday, October 17, 2014

#IJSRD | Wireless Phone Charger: the uniqueness and the features

Wowhoo Wireless Phone Charger: the uniqueness and the features
blog#IJSRD | Research Lets Do it… #call for paper
Major wireless phone carriers have all been adapting the Qi wireless technology. Additionally many car manufactures are adding them to their 2014-2015 models. Manufactures include but are not limited to the following: Jeep, Toyota, Prius Harrier, Mercedes Benz, BMW, Volkswagen, Audi aswell as Porsche.
Due to the new and improved design and usability our initial launch date has been revised from Jan 7th to March 1st. we added approximately 8mm to our diameter to allow a better internal design.  The small revision to the Wowhoo charger allow us to get that quicker charge which is most important. The 10% is a big jump in charging speed.
for more details click here

Friday, August 15, 2014

#IJSRD advanced persistent threat (APT)


Advanced Persistent Threats (APTs) are a cybercrime category directed at business and political targets. APTs require a high degree of stealithiness over a prolonged duration of operation in order to be successful. The attack objectives therefore typically extend beyond immediate financial gain, and compromised systems continue to be of service even after key systems have been breached and initial goals reached.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com

#IJSRD MOBILE PROTECTION VICTIMISATION VOICE VERIFICATION


Cellular communication business has developed leaps and bounds to become the core of day to day science. Mobile phones is that the spirit of cellular business. the quantity of mobile phones users is rising exponentially. however the privacy of user and security of mobile phones leftovers a difficult question. Theft of mobile phones has become the attention catching business for offender. There ought to be a reliable methodology of protective the instrument from thief. My paper proposes a brand new innovative, reliable, trick proof precautions for mobile phones victimization VOICE VERIFICATION. Voice verification is that the identification of a personal identity victimization speech because the spotting quality. The voice of the user is processed employing a digital gesture processor that is that the prime a part of a mobile. we have a tendency to are programming this DSP to implement this safety technique. For most a resourceful voice record of the user is formed. This record is hold on within the Flash read-only storage that is out there within the mobile. Then whenever the user speaks through the mobile phones a part of the speech sample is taken and hold on. This processed voice of the user is compared with the first folder to examine the identity of the user. If the user is allowed, he’s allowed to continue his speak. If not the transmission is cut unexpectedly by creating the DSP in inactive state. Therefore the mobile is being shielded from any extralegal user. Not with standing the mobile phones was purloined or lost it won’t be helpful for the other individual. The programmability of DSP and generality of Voice based mostly classification has given our methodology a twin advantage. Our set up demands neither external hardware nor additional price. The on top of methodology cause no hardship for the user not like this safety systems. This methodology may be adopted universally altogether models of Mobile phones and mobile phones for cover.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

Wednesday, August 13, 2014

#IJSRD Cost effective and innovative housing technology


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students….
kindly share to all engineers…
Visit us on www.ijsrd.com

https://wordpress.com/post/71238472/46/


Shelter is amongst the three basic human needs but now-a-days, about two-third of the total Indian population does not have their own shelter. This two-third population belongs to the middle and lower income class. These people find it difficult to construct their houses at an affordable cost by using conventional construction technology. It is found in many cases that people serve their whole life constructing their own house, but fail. The mission and dream of these people can be achieved by appropriate use of cost effective and innovative construction technology. As a whole, the housing shortage of the country can be overcome within lesser FUNDS, without compromising with the quality control and structural stability of the structure.
Useful website for Engineering (Diploma,BCA,MCA,B.E/M.E/Ph.D) Students....
kindly share to all engineers...
Visit us on www.ijsrd.com