1. Comparative Analysis of Image Segmentation Methods

Akash Dutt Dubey, Dept. of Computer Engineering, IIT (BHU), Varanasi, India

R.B.Mishra, Dept. of Computer Engineering, IIT (BHU), Varanasi, India

Abstract:

Image Processing has been an important area of research for some time. Even since the 1920’s when newspaper photographs were transmitted through transatlantic cables there has been interest in upgrading the pictorial information for human interpretation as well as the data processing for machine perception. Since then, different methods have been proposed for the image segmentation. Extensive research has been done in creating many different approaches and algorithms for image segmentation, but it is still difficult to assess whether one algorithm produces more accurate segmentations than another, whether it be for a particular image or set of images, or more generally, for a whole class of images. This paper discusses the different methods used for the image segmentation such as Threshold Method, Genetic Algorithm, Fuzzy C means Clustering and Color Image Segmentation along with their results.

2. Character Recognition: A Neural Network Approach

R. C. Tripathi, Associate Professor, Department of IT IMS, Noida (U.P.)

Vijay Kumar, Sr. Lecturer, Department of CSE MIET, Meerut (U.P.)

Abstract:

Developing proprietary OCR system is a complicated task and requires a lot of effort. Such systems usually are really complicated and can hide a lot of logic behind the code. The use of artificial neural network in OCR applications can dramatically simplify the code and improve quality of recognition while achieving good performance. Another benefit of using neural network in OCR is extensibility of the system ability to recognize more character sets than initially defined. Most of traditional OCR systems are not extensible enough.

Character recognition techniques help in recognizing the characters written on paper documents and converting it in digital form. So Character recognition is gaining interest and importance in the modern world. While the area of character recognition is vast we focus on the fundamentals of character recognition, available techniques and emphasis on more recently used technique, neural networks. The paper throws light on, one of the application of Neural Network i.e. Character Recognition.

3. A New High Accuracy Clustering Algorithm for Categorical Datasets

Subhash Chandra Yadav, Associate Professor, RSMT, Varanasi

Gulab Lal Singh, Pankaj Rai, Strudent M. TECH ,CSE Teerthankar Mahaveer University Moradabad)

Shivchand Yadav, Lecturer, Gaurav Maha Vidyalaya, Danganj, Varanasi

Abstract:

Step by step operation by which we make a group of objects in which attributes of all the objects are nearly similar, known as clustering. So, a cluster is a collection of objects that acquire nearly same attribute values. The property of an object in a cluster is similar to other objects in same cluster but different with objects of other clusters. Clustering is used in wide range of applications like pattern recognition, image processing, data analysis, machine learning etc. Nowadays, more attention has been put on categorical data rather than numerical data. Where, the range of numerical attributes organizes in a class like small, medium, high, and so on. There is wide range of algorithm that used to make clusters of given categorical data. The approach of this paper is to enhance the working of well known clustering algorithm k-modes to improve accuracy of an algorithm; the result in a new categorical clustering algorithm. With underlying advantages and weaknesses associated with this new algorithm.

4. Social Network Mining and Analysis: A Data Mining Approach

Alok Singh Chauhan, Assistant Professor, MCA Department, RKGIT, Ghaziabad

Narendra Kumar Sharma , Lecturer, Department of Computer Science, DSU, Haridwar

Abstract:

Social network analysis is used widely in the social and behavioral sciences, as well as in economics, marketing, and industrial engineering. The social network perspective focuses on relationships among social entities and is an important addition to standard social and behavioral research, which is primarily concerned with attributes of the social units. Recently there has been a rapid increase in interest regarding social network analysis in the data mining community. The basic motivation is the demand to exploit knowledge from copious amounts of data collected, pertaining to social behavior of users in online environments. Data mining based techniques are proving to be useful for analysis of social network data, especially for large datasets that cannot be handled by traditional methods. This paper will provide an up-to-date introduction to the increasingly important field of data mining in social network analysis, and a brief overview of research directions and challenges in this field.

5. Information Security Management: Risk base approach for better management decision

Mr. Shrish Kumar Tiwari, Research-scholar in Department of Commerce and Business Administration, University of Allahabad, Allahabad.

Mr. Jitendra Singh, Information security consultant

Abstract:

Being a good element of corporate sector, every organization should be committed to good corporate governance and believes in attainment of highest level of confidentiality, integrity, availability and accountability in all its information assets, operation and places emphasis on responsible conduct. Organizations are required to adequately mitigate risk arising from use of information and information systems in the execution of missions and business functions In order to reflect the same, the organization should define the procedure to identify the risks and its management. Every time management have to see cost factor in the interest of business that is why risk based security management practices provide most cost effective approach for management to discuss the cost to implement security controls and cost not to implement the controls which include reputation loss also and accept the security risk or not, accordingly.
An effective risk management process is an important component of a successful IT security program. The principal goal of an organization’s risk management process should be to protect the organization and its ability to perform their mission, not just its IT assets. Therefore, the risk management process should not be treated primarily as a technical function carried out by the IT experts who operate and manage the IT system, but as an essential management function of the organization.
This paper focuses on the aspects like better risk management and intended to present how a Risk and Trust base approach would facilitate the authorities and higher management to make decision.

6. The Load Balancing And Sharing In Geographically Distributed Resources In Distributed System

Rajesh Kumar, Faculty,MCA Course, University Department of Mathematics, B.R.A. Bihar University, Muzaffarpur

Navin Kumar, Faculty, Dept. of B.C.A. M.D.D.M. College,Muzaffarpur, B.R.A. Bihar University, Muzaffarpur

Prof. (Dr.) A K Singh, Department Of Mathematics, Babasaheb Bhimrao Ambedkar Bihar University, Muzaffarpur

Abstract:

One of the purposes of distributed systems is to enable applications and service processes to proceed concurrently without competing for the same resources and to use or exploit the available computational resources like processor, memory and network capacities for example the ability to run applets on client computers removes load from web servers enabling it to provide a better service. A more significant example is in the use of several computers to host a single service. This is needed by heavily loaded web servers like search engines, large commercial sites. Load sharing may be centralized, hierarchical or decentralized. The resources distributed globally such as storage devices, data sources, and supercomputers, are interconnected and can be exploited by users around the world as one, unified resource. To a growing extent, repetitive or resource-intensive IT tasks can be outsourced to service providers, which execute the task and often provide the results at a lower cost. This service-oriented approach from organizations offering a large portfolio of services can be scalable and flexible. The computer in last seven decades had seen lot of development surprises. This paper describes the advent of new forms of distributed computing, notably grid and cloud computing, the applications that they enable, and their potential impact on future standardization and load balancing.

7. Applications of E-Commerce and its Impact in Cement Industry

Venkata Raj Mandiga, Dy. General Manager (Systems) in Manikgarh Cement

Dr. K.B. Moharir, Dept. of Commerce, Sardar Patel College, Chandrapur, Maharashtra

Abstract:

The paper consists of a study based on survey done in Maharashtra with 700 dealers and customers who gave the sketch for scope and future of eCommerce in their business with cement manufacturers. This paper examines the adaptability of eCommerce between Customers, Dealers and Manufacturers. The study covered various factors involved for willingness to use eCommerce for Cement purchases and also explored various reasons for not to use eCommerce.

8. Cloud Computing: An Emerging Computing Paradigm, Applications and Issues

Assistant Professor, Department of Computer Application, Technical Education & Research Institute, Ghazipur

Abstract:

Cloud Computing is an innovative computing paradigm, which transform computing as a utility by renovating IT industry, making software even more attractive as a Service, using new way of IT hardware. The endeavor of this paper is to provide insight view and comprehensive knowledge of Cloud Computing, its relevance in the context of current IT industry and to discuss its several aspects from software as well as hardware point of view. It elaborates this computing architecture and evolving Cloud Computing Models i.e. SaaS, PaaS and IaaS. It discusses and outlines the various Cloud Computing applications in use, provided by different Cloud Providers and their significance in today scenario such as mint, cloudo, icloud, eyeOS and Active Panda. This paper also highlights various issues regarding security, privacy and authentication which must be considered by the organization to exploit it efficiently and safely.

© 2015, School of Management Sciences | All rights reserved.

MANDATORY DISCLOSURE | WEBMAIL | Chat Live