SlideShare a Scribd company logo
TTOOPP 5 MMoosstt VViieeww AArrttiiccllee iinn
CCoommppuutteerr SScciieennccee && IInnffoorrmmaattiioonn
TTeecchhnnoollooggyy RReesseeaarrcchh
International Journal of Computer Science and
Information Technology (IJCSIT)
Google Scholar Citation
ISSN: 0975-3826(online); 0975-4660 (Print)
http://airccse.org/journal/ijcsit.html
SECURITY THREATS ON CLOUD COMPUTING
VULNERABILITIES
Te-Shun Chou
Department of Technology Systems, East Carolina University, Greenville, NC,
U.S.A.
ABSTRACT
Clouds provide a powerful computing platform that enables individuals and organizations to
perform variety levels of tasks such as: use of online storage space, adoption of business
applications, development of customized computer software, and creation of a “realistic” network
environment. In previous years, the number of people using cloud services has dramatically
increased and lots of data has been stored in cloud computing environments. In the meantime,
data breaches to cloud services are also increasing every year due to hackers who are always
trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud
service models were compared; cloud security risks and threats were investigated based on the
nature of the cloud service models. Real world cloud attacks were included to demonstrate the
techniques that hackers used against cloud computing systems. In addition,countermeasures to
cloud security breaches are presented.
KEYWORDS
Cloud computing, cloud security threats and countermeasures, cloud service models
For More Details : http://airccse.org/journal/jcsit/5313ijcsit06.pdf
Volume Link : http://airccse.org/journal/ijcsit2013_curr.html
REFERENCES
1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics
2. Sophos Security Threat Report 2012. http://www.sophos.com/
3. Amazon.com Server Said to Have Been Used in Sony Attack,
May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to-
have-been- invaded-by-hackersusing-amazon-com-server.html
4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,”
International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp.
2672- 2676, April 2011.
5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE
International Conference on Cloud Computing Technology and Science,
Indianapolis, December 2010.
6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th
Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii,
January 2011.
7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat
Technical Security Conference, 2011.
8. CERT Coordination Center, Denial
of
Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html
9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security
Issues in Cloud Computing,” IEEE International Conference in Cloud Computing,
pp. 109-116, Bangalore, 2009.
10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August
2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_
deni al_of_service_attack
11. DDoS Attack Rains Down on Amazon Cloud, October
2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/
12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon
University.
13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and
Recommendations for Information Security,” The European Network and
Information Security Agency (ENISA), November 2009.
14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/
15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data-
breach-trendsstats/
16. 2012 Has Delivered Her First Giant Data Breach, January
2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First-
Giant-DataBreach.html
17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today,
2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h
tm l
18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June,
2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/
19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox-
yes-we-werehacked/
20. Web Based Attacks, Symantec White Paper, February 2009.
21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012.
22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to
Averting SQL Injection for University Cloud,” International Journal of Computer
Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012.
23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection
Attacks on Web Application,” International Journal of Computer Applications, Vol.
52, No. 2, pp. 19-26, August 2012.
24. Web Application Attack Report For The Second Quarter of
2012.http://www.firehost.com/company/newsroom/web-application-attack-report-
second-quarter-2012
25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July
2008.http://www.sophos.com/en-us/press-office/press-
releases/2008/07/playstation.aspx
26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud
Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009.
27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing
Journal, November 2010.
28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011.
http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is
sue_ amazon_aws_attack/
29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and
Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York,
NY, pp. 20–27, 2005.
30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security
Validation Revisited,” IEEE International Conference on Web Services, Los
Angeles, 2009.
31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,”
2011 IEEE International Conference on Signal Processing, Communications and
Computing, Xi'an, China, September 2011.
32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based
Security Vulnerability Assessment,” IEEE International Conference on E-Business
Engineering, pp.490-494, November 2010.
33. Amazon:Hey Spammers, Get Off My
Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer
s_get_off_my.html
34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud
Computing,” Computer Security Division, Information Technology Laboratory,
National Institute of Standards and Technology, Special Publication 800-144,
December 2011.
35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140
36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010.
37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider
Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy
Workshops, pp. 125-128, San Francisco, CA, 2012.
38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of
XML Schema Validation for Countering XML Signature Wrapping Attacks,” First
International Workshop on Securing Services on the Cloud, Milan, Italy, September
2011.
39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping
Attacks and Countermeasures,” IEEE International Conference on Web Services, pp.
575–582, Miami, Florida, July 2009.
BIG DATA IN CLOUD COMPUTING REVIEW AND
OPPORTUNITIES
Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert
Seidenberg School of CSIS, Pace University, White Plains, New York
ABSTRACT
Big Data is used in decision making process to gain useful insights hidden in the data for
business and engineering. At the same time it presents challenges in processing, cloud
computing has helped in advancement of big data by providing computational, networking
and storage capacity. This paper presents the review, opportunities and challenges of
transforming big data using cloud computing resources.
KEYWORDS
Big data; cloud computing; analytics; database; data warehouse
For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf
Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
REFERENCES
[1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October).
On the elasticity of nosql databases over cloud management platforms. In Proceedings of the
20th ACM international conference on Information and knowledge management (pp. 2385-
2388). ACM.
[2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big
data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033.
[3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data
Eng. Bull, 32(1), 3-12.
[4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development,
2(4), 314-319 International Journal of Computer Science & Information Technology (IJCSIT)
Vol 11, No 4, August 2019 57
[5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical
methods." Journal of Business Research 70 (2017): 263-286.
[6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/
[7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models
(SaaS, PaaS, and IaaS). John Wiley & Sons, 2014.
[8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf
[9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management
Auerbach, ed.
[10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th
international symposium on pervasive systems, algorithms and networks. IEEE, 2012.
[11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive
Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366).
IEEE.
[12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE,
pp.405–409
[13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing
environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews:
Data Mining and Knowledge Discovery 4.5 (2014): 380-409.
[14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf
[15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges
[J]." Journal of computer research and development 1.98 (2013): 146-169.
[16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data
Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.
AN ALGORITHM FOR PREDICTIVE DATA MINING APPROACH IN
MEDICAL DIAGNOSIS
Shakuntala Jatav1
and Vivek Sharma2
1
M.Tech Scholar, Department of CSE, TIT College, Bhopal 2
Professor,
Department of CSE, TIT College, Bhopal
ABSTRACT
The Healthcare industry contains big and complex data that may be required in order to
discover fascinating pattern of diseases & makes effective decisions with the help of
different machine learning techniques. Advanced data mining techniques are used to
discover knowledge in database and for medical research. This paper has analyzed
prediction systems for Diabetes, Kidney and Liver disease using more number of input
attributes. The data mining classification techniques, namely Support Vector
Machine(SVM) and Random Forest (RF) are analyzed on Diabetes, Kidney and Liver
disease database. The performance of these techniques is compared, based on precision,
recall, accuracy, f_measure as well as time. As a result of study the proposed algorithm is
designed using SVM and RF algorithm and the experimental result shows the accuracy of
99.35%, 99.37 and 99.14 on diabetes, kidney and liver disease respectively.
KEYWORDS
Data Mining, Clinical Decision Support System, Disease Prediction, Classification,
SVM, RF.
For More Details : http://aircconline.com/ijcsit/V10N1/10118ijcsit02.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
REFERENCES
[1] Nidhi Bhatla, Kiran Jyoti, “An Analysis of Heart Disease Prediction using Different Data
Mining Techniques”,IJERT,Vol 1, Issue 8, 2012.
[2] Syed Umar Amin, Kavita Agarwal, Rizwan Beg, “Genetic Neural Network based Data
Mining in Prediction of Heart Disease using Risk Factors”, IEEE, 2013.
[3] A H Chen, S Y Huang, P S Hong, C H Cheng, E J Lin, “HDPS: Heart Disease Prediction
System”, IEEE, 2011.
[4] M. Akhil Jabbar, B. L Deekshatulu, Priti Chandra, “Heart Disease Prediction using Lazy
Associative Classification”, IEEE, 2013.
[5] Chaitrali S. Dangare, Sulabha S. Apte, “Improved Study of Heart Disease Prediction System
using Data Mining Classification Techniques”, IJCA, Volume 47– No.10, June 2012.
[6] P. Bhandari, S. Yadav, S. Mote, D.Rankhambe, “Predictive System for Medical Diagnosis
with Expertise Analysis”, IJESC, Vol. 6, pp. 4652-4656, 2016.
[7] Nishara Banu, Gomathy, “Disease Forecasting System using Data Mining Methods”, IEEE
Transaction on Intelligent Computing Applications, 2014.
[8] A. Iyer, S. Jeyalatha and R. Sumbaly, “Diagnosis of Diabetes using Classification Mining
Techniques”, IJDKP, Vol. 5, pp. 1-14, 2015.
[9] Sadiyah Noor Novita Alfisahrin and Teddy Mantoro, “Data Mining Techniques for
Optimatization of Liver Disease Classification”, International Conference on Advanced
Computer Science Applications and Technologies, IEEE, pp. 379-384, 2013.
[10] A. Naik and L. Samant, “Correlation Review of Classification Algorithm using Data Mining
Tool: WEKA, Rapidminer , Tanagra ,Orange and Knime”, ELSEVIER, Vol. 85, pp. 662-
668, 2016.
[11] Uma Ojha and Savita Goel, “A study on prediction of breast cancer recurrence using data
mining techniques”, International Conference on Cloud Computing, Data Science &
Engineering, IEEE, 2017.
[12] Naganna Chetty, Kunwar Singh Vaisla, Nagamma Patil, “An Improved Method for Disease
Prediction using Fuzzy Approach”, International Conference on Advances in Computing
and Communication Engineering, IEEE, pp. 568-572, 2015.
[13] Kumari Deepika and Dr. S. Seema, “Predictive Analytics to Prevent and Control Chronic
Diseases”, International Conference on Applied and Theoretical Computing and
Communication Technology, IEEE, pp. 381-386, 2016.
[14] Emrana Kabir Hashi, Md. Shahid Uz Zaman and Md. Rokibul Hasan, “An Expert Clinical
Decision Support System to Predict Disease Using Classification Techniques”, IEEE,2017
CONVOLUTIONAL NEURAL NETWORK BASED FEATURE
EXTRACTION FOR IRIS RECOGNITION
Maram.G Alaslani1
and Lamiaa A. Elrefaei1,2
1
Computer Science Department, Faculty of Computing and Information
Technology, King Abdulaziz University, Jeddah, Saudi Arabia
2
Electrical Engineering Department, Faculty of Engineering at Shoubra, Benha
University, Cairo, Egypt
ABSTRACT
Iris is a powerful tool for reliable human identification. It has the potential to identify individuals
with a high degree of assurance. Extracting good features is the most significant step in the iris
recognition system. In the past, different features have been used to implement iris recognition
system. Most of them are depend on hand-crafted features designed by biometrics specialists.
Due to the success of deep learning in computer vision problems, the features learned by the
Convolutional Neural Network (CNN) have gained much attention to be applied for iris
recognition system. In this paper, we evaluate the extracted learned features from a pre-trained
Convolutional Neural Network (Alex-Net Model) followed by a multi-class Support Vector
Machine (SVM) algorithm to perform classification. The performance of the proposed system is
investigated when extracting features from the segmented iris image and from the normalized iris
image. The proposed iris recognition system is tested on four public datasets IITD, iris databases
CASIAIris-V1, CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved
excellent results with the very high accuracy rate.
KEYWORDS
Biometrics, Iris, Recognition, Deep learning, Convolutional Neural Network (CNN), Feature
extraction (FE).
For More Details : http://aircconline.com/ijcsit/V10N2/10218ijcsit06.pdf
Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
REFERENCES
[1] M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and
crossenterprise biometric identification," Expert Systems with Applications, vol. 42, pp.
7905-7916, 2015.
[2] D. Kesavaraja, D. Sasireka, and D. Jeyabharathi, "Cloud software as a service with iris
authentication," Journal of Global Research in Computer Science, vol. 1, pp. 16-22, 2010.
[3] N. Shah and P. Shrinath, "Iris Recognition System–A Review," International Journal of
Computer and Information Technology, vol. 3, 2014.
[4] A. B. Dehkordi and S. A. Abu-Bakar, "A review of iris recognition system," Jurnal
Teknologi, vol. 77, 2015.
[5] S. Minaee, A. Abdolrashidiy, and Y. Wang, "An experimental study of deep convolutional
features for iris recognition," in Signal Processing in Medicine and Biology Symposium
(SPMB), 2016 IEEE, 2016, pp. 1-6. International Journal of Computer Science &
Information Technology (IJCSIT) Vol 10, No 2, April 2018 77
[6] S. Minaee, A. Abdolrashidi, and Y. Wang, "Iris recognition using scattering transform and
textural features," in Signal Processing and Signal Processing Education Workshop
(SP/SPE), 2015 IEEE, 2015, pp. 37-42.
[7] S. Minaee, A. Abdolrashidi, and Y. Wang, "Face Recognition Using Scattering
Convolutional Network," arXiv preprint arXiv:1608.00059, 2016.
[8] IIT Delhi Database. Available:
http://www4.comp.polyu.edu.hk/~csajaykr/IITD/Database_Iris.htm. Accessed 14 April
2017.
[9] ( 2 April2017). CASIA Iris Image Database Version 1.0. Available:
http://www.idealtest.org/findDownloadDbByMode.do?mode=Iris. Accessed 12 April 2017.
[10] CASIA Iris Image Database Version 4.0 (CAS IA-Iris-Thousand). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=4. Accessed 17 April 2017.
[11] CASIA Iris Image Database Version 3.0 (CASIA-Iris-Interval). Available:
http://biometrics.idealtest.org/dbDetailForUser.do?id=3. Accessed 17April2017.
[12] K. Nguyen, C. Fookes, A. Ross, and S. Sridharan, "Iris Recognition with Off-the-Shelf CNN
Features: A Deep Learning Perspective," IEEE Access, 2017.
[13] A. Romero, C. Gatta, and G. Camps-Valls, "Unsupervised deep feature extraction for remote
sensing image classification," IEEE Transactions on Geoscience and Remote Sensing, vol.
54, pp. 1349-1362, 2016.
[14] O. Oyedotun and A. Khashman, "Iris nevus diagnosis: convolutional neural network and
deep belief network," Turkish Journal of Electrical Engineering & Computer Sciences, vol.
25, pp. 1106-1115, 2017.
[15] A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, "A multi-biometric
iris recognition system based on a deep learning approach," Pattern Analysis and
Applications, pp. 1-20, 2017.
[16] J. Nagi, F. Ducatelle, G. A. Di Caro, D. Cireşan, U. Meier, A. Giusti, F. Nagi, J.
Schmidhuber, and L. M. Gambardella, "Max-pooling convolutional neural networks for
vision-based hand gesture recognition," in Signal and Image Processing Applications
(ICSIPA), 2011 IEEE International Conference on, 2011, pp. 342-347.
[17] D. Scherer, A. Müller, and S. Behnke, "Evaluation of pooling operations in convolutional
architectures for object recognition," Artificial Neural Networks–ICANN 2010, pp. 92-101,
2010.
[18] J. van Doorn, "Analysis of deep convolutional neural network architectures," 2014.
[19] C. L. Lam and M. Eizenman, "Convolutional neural networks for eye detection in remote
gaze estimation systems," 2008.
[20] S. Ahmad Radzi, K.-H. Mohamad, S. S. Liew, and R. Bakhteri, "Convolutional neural
network for face recognition with pose and illumination variation," International Journal of
Engineering and Technology (IJET), vol. 6, pp. 44-57, 2014.
[21] K. Itqan, A. Syafeeza, F. Gong, N. Mustafa, Y. Wong, and M. Ibrahim, "User identification
system based on finger-vein patterns using Convolutional Neural Network," ARPN Journal
of Engineering and Applied Sciences, vol. 11, pp. 3316-3319, 2016.
[22] S. Sangwan and R. Rani, "A Review on: Iris Recognition," (IJCSIT) International Journal of
Computer Science and Information Technologies, vol. 6, pp. 3871-3873, 2015
[23] C. Jayachandra and H. V. Reddy, "Iris Recognition based on Pupil using Canny edge
detection and KMeans Algorithm," Int. J. Eng. Comput. Sci., vol. 2, pp. 221-225, 2013.
[24] L. A. Elrefaei, D. H. Hamid, A. A. Bayazed, S. S. Bushnak, and S. Y. Maasher, "Developing
Iris Recognition System for Smartphone Security," Multimedia Tools and Applications, pp.
1-25, 2017.
[25] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep
convolutional neural networks," in Advances in neural information processing systems,
2012, pp. 1097-1105.
[26] S. Minaee and Y. Wang, "Palmprint Recognition Using Deep Scattering Convolutional
Network," arXiv preprint arXiv:1603.09027, 2016.
[27] J. Weston and C. Watkins, "Multi-class support vector machines," Technical Report CSD-
TR-98-04, Department of Computer Science, Royal Holloway, University of London,
May1998.
[28] G. Xu, Z. Zhang, and Y. Ma, "A novel method for iris feature extraction based on
intersecting cortical model network," Journal of Applied Mathematics and Computing, vol.
26, pp. 341-352, 2008.
[29] M. Abhiram, C. Sadhu, K. Manikantan, and S. Ramachandran, "Novel DCT based feature
extraction for enhanced iris recognition," in Communication, Information & Computing
Technology (ICCICT), 2012 International Conference on, 2012, pp. 1-6.
[30] M. Elgamal and N. Al-Biqami, "An efficient feature extraction method for iris recognition
based on wavelet transformation," Int. J. Comput. Inf. Technol, vol. 2, pp. 521-527, 2013.
[31] B. Bharath, A. Vilas, K. Manikantan, and S. Ramachandran, "Iris recognition using radon
transform thresholding based feature extraction with Gradient-based Isolation as a pre-
processing technique," in Industrial and Information Systems (ICIIS), 2014 9th International
Conference on, 2014, pp. 1-8.
[32] S. S. Dhage, S. S. Hegde, K. Manikantan, and S. Ramachandran, "DWT-based feature
extraction and radon transform based contrast enhancement for improved iris recognition,"
Procedia Computer Science, vol. 45, pp. 256-265, 2015.
AUTHORS
Maram G. Alaslani Received her B.Sc. degree in Computer Science with Honors from King
Abdulaziz University in 2010. She works as Teaching Assistant from 2011 to date at Faculty of
Computers and Information Technology at King Abdulaziz University, Rabigh, Saudi Arabia.
Now she is working in her Master Degree at King Abdulaziz University, Jeddah, Saudi Arabia.
She has a research interest in image processing, pattern recognition, and neural network..
Lamiaa A. Elrefaei received her B.Sc. degree with honors in Electrical Engineering (Electronics
and Telecommunications) in 1997, her M.Sc. in 2003 and Ph.D. in 2008 in Electrical Engineering
(Electronics) from faculty of Engineering at Shoubra, Benha University, Egypt. She held a
number of faculty positions at Benha University, as Teaching Assistant from 1998 to 2003, as an
Assistant Lecturer from 2003 to 2008, and has been a lecturer from 2008 to date. She is currently
an Associate Professor at the faculty of Computing and Information Technology, King Abdulaziz
University, Jeddah, Saudi Arabia. Her research interests include computational intelligence,
biometrics, multimedia security, wireless networks, and Nano networks. She is a senior member
of IEEE..
DIAGONAL BASED FEATURE EXTRACTION FOR
HANDWRITTEN ALPHABETS RECOGNITION SYSTEM
USING NEURAL NETWORK
J.Pradeep1
, E.Srinivasan2
and S.Himavathi3
1,2
Department of ECE, Pondicherry College Engineering, Pondicherry, India.
3
Department of EEE, Pondicherry College Engineering, Pondicherry, India.
ABSTRACT
An off-line handwritten alphabetical character recognition system using multilayer feed forward
neural network is described in the paper. A new method, called, diagonal based feature extraction
is introduced for extracting the features of the handwritten alphabets. Fifty data sets, each
containing 26 alphabets written by various people, are used for training the neural network and
570 different handwritten alphabetical characters are used for testing. The proposed recognition
system performs quite well yielding higher levels of recognition accuracy compared to the
systems employing the conventional horizontal and vertical methods of feature extraction. This
system will be suitable for converting handwritten documents into structural text form and
recognizing handwritten names
KEYWORDS
Handwritten character recognition, Image processing, Feature extraction, feed forward neural
networks.
.
For More Details : http://airccse.org/journal/jcsit/0211ijcsit03.pdf
Volume Link : http://airccse.org/journal/ijcsit2011_curr.html
REFERENCES
[1] S. Mori, C.Y. Suen and K. Kamamoto, “Historical review of OCR research and
development,” Proc. of IEEE, vol. 80, pp. 1029-1058, July 1992.
[2] S. Impedovo, L. Ottaviano and S. Occhinegro, “Optical character recognition”,
International Journal Pattern Recognition and Artificial Intelligence, Vol. 5(1-2),
pp. 1-24, 1991.
[3] V.K. Govindan and A.P. Shivaprasad, “Character Recognition – A review,”Pattern
Recognition, vol. 23, no. 7, pp. 671- 683,
[4] R. Plamondon and S. N. Srihari, “On-line and off- line handwritten character
recognition: A comprehensive survey,”IEEE. Transactions on Pattern Analysis
and Machine Intelligence, vol. 22, no. 1, pp. 63-84, 2000.
[5] N. Arica and F. Yarman-Vural, “An Overview of Character Recognition Focused on
Off-line Handwriting”, IEEE Transactions on Systems, Man, and Cybernetics, Part
C: Applications and Reviews, 2001, 31(2), pp. 216 - 233.
[6] U. Bhattacharya, and B. B. Chaudhuri, “Handwritten numeral databases of Indian
Scripts and multistage recognition of mixed numerals,” IEEE Transaction on Pattern
analysis and machine intelligence, vol.31, No.3, pp.444-457, 2009.
[7] U. Pal, T. Wakabayashi and F. Kimura, “Handwritten numeral recognition of six
popular scripts,” Ninth International conference on Document Analysis and
Recognition ICDAR 07, Vol.2, pp.749-753, 2007.
[8] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character
Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence,
Vol. 18, No.7, July 1996, pp. 690-706.
[9] Anil.K.Jain and Torfinn Taxt, “Feature extraction methods for character recognitionA
Survey,” Pattern Recognition, vol. 29, no. 4, pp. 641-662, 1996.
[10] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character
Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence,
Vol. 18, No.7, July 1996, pp. 690-706.
[11] C. L. Liu, H. Fujisawa, “Classification and Learning for Character
Recognition:Comparison of Methods and Remaining Problems”, Int. Workshop on
Neural Networks and Learning in Document Analysis and Recognition, Seoul, 2005.
[12] F. Bortolozzi, A. S. Brito, Luiz S. Oliveira and M. Morita, “Recent Advances in
Handwritten Recognition”, Document Analysis, Umapada Pal, Swapan K. Parui,
Bidyut B. Chaudhuri, pp 1-30.
[13] Anita Pal & Dayashankar Singh, “Handwritten English Character Recognition Using
Neural,” Network International Journal of Computer Science & Communication.vol.
1,No. 2, July-December 2010, pp. 141-144.
[14] Dinesh Acharya U, N V Subba Reddy and Krishnamurthy, “Isolated handwritten
Kannada numeral recognition using structural feature and K-means cluster,” IISN-
2007, pp-125 -129.
[15] N. Sharma, U. Pal, F. Kimura, "Recognition of Handwritten Kannada Numerals",
9thInternational Conference on Information Technology (ICIT'06), ICIT, pp. 133-
136.
[16] Rafael C. Gonzalez, Richard E. woods and Steven L.Eddins, Digital Image
Processing using MATLAB, Pearson Education, Dorling Kindersley, South Asia,
2004.
[17] S.V.Rajashekararadhya, and P.VanajaRanjan, “Efficient zone based feature
extraction algorithm for handwritten numeral recognition of four popular south-
Indian scripts,” Journal of Theoretical and Applied Information Technology, JATIT
vol.4, no.12, pp.1171-1181, 2008.

More Related Content

PDF
New Research Articles 2021 June Issue International Journal of Computer Scien...
PDF
April 2021: Top 10 View Article in Computer Science & Information Technology
PDF
Top Download Article in Computer Science & Information Technology Research: O...
PDF
Top cited Network Security Articles- Part 1
PDF
March 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
January 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
October 2020 - Top Read Articles in Network Security & Its Applications
PDF
07 20251 latest trends, challenges ed
New Research Articles 2021 June Issue International Journal of Computer Scien...
April 2021: Top 10 View Article in Computer Science & Information Technology
Top Download Article in Computer Science & Information Technology Research: O...
Top cited Network Security Articles- Part 1
March 2021: Top 10 Read Articles in Network Security and Its Applications
January 2021 - Top 10 Read Articles in Network Security & Its Applications
October 2020 - Top Read Articles in Network Security & Its Applications
07 20251 latest trends, challenges ed

What's hot (20)

PDF
Most Downloaded article for an year in academia - International Journal of Ne...
PDF
March 2022 - Top 10 Read Articles in Network Security and Its Applications
PDF
Most cited articles in academia - International journal of network security &...
PDF
December 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
November 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
Top 10 Read Article in Computer Science & Information Technology: September 2021
PDF
June 2020: Top Read Articles in Advanced Computing
PDF
June 2021 - Top 10 Read Articles in Network Security and Its Applications
PDF
May 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
Top 10 Download Article in Computer Science & Information Technology: October...
PPTX
Various security issues and its solutions in the
PDF
Security research trends in 2020
PDF
July 2021 - Top 10 Read Articles in Network Security & Its Applications
PDF
October 2021: Top 10 Read Articles in Network Security and Its Applications
PPTX
Cloud computing final
PDF
September 2021: Top 10 Read Articles in Network Security and Its Applications
PDF
International Journal of Network Security & Its Applications (IJNSA) - Curren...
PDF
Ms3422732277
PDF
Cloud storage limit monitoring measures
PDF
Eb31854857
Most Downloaded article for an year in academia - International Journal of Ne...
March 2022 - Top 10 Read Articles in Network Security and Its Applications
Most cited articles in academia - International journal of network security &...
December 2021: Top 10 Read Articles in Network Security and Its Applications
November 2021 - Top 10 Read Articles in Network Security & Its Applications
Top 10 Read Article in Computer Science & Information Technology: September 2021
June 2020: Top Read Articles in Advanced Computing
June 2021 - Top 10 Read Articles in Network Security and Its Applications
May 2021: Top 10 Read Articles in Network Security and Its Applications
Top 10 Download Article in Computer Science & Information Technology: October...
Various security issues and its solutions in the
Security research trends in 2020
July 2021 - Top 10 Read Articles in Network Security & Its Applications
October 2021: Top 10 Read Articles in Network Security and Its Applications
Cloud computing final
September 2021: Top 10 Read Articles in Network Security and Its Applications
International Journal of Network Security & Its Applications (IJNSA) - Curren...
Ms3422732277
Cloud storage limit monitoring measures
Eb31854857
Ad

Similar to TOP 5 Most View Article in Computer Science & Information Technology Research (20)

PDF
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
PDF
May 2022: Most Downloaded Articles in Computer Science &Information Technology
PDF
December 2023 - Top 10 Read Articles in Network Security & Its Applications
PDF
March 2025 - Top 10 Read Articles in Network Security & Its Applications
PDF
September 2022: Top 10 Read Articles in Network Security & Its Applications
PDF
January 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
October 2022: Top 10 Read Articles in Network Security & Its Applications
PDF
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
December 2022: Top 10 Read Articles in Network Security and Its Applications
PDF
July 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
June 2025 - Top 10 Read Articles in Network Security and Its Applications
PDF
April 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
PDF
June 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
April 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
May 2025 - Top 10 Read Articles in Network Security and Its Applications
PDF
May 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
April 2022 - Top 10 Read Articles in Network Security and Its Applications
PDF
March 2023: Top 10 Read Articles in Network Security and Its Applications
PDF
January 2024 - Top 10 Read Articles in Network Security & Its Applications
PDF
September 2024: Top 10 Read Articles in Network Security and Its Applications
November 2024-: Most Downloaded Articles in Computer Science & Information Te...
May 2022: Most Downloaded Articles in Computer Science &Information Technology
December 2023 - Top 10 Read Articles in Network Security & Its Applications
March 2025 - Top 10 Read Articles in Network Security & Its Applications
September 2022: Top 10 Read Articles in Network Security & Its Applications
January 2023: Top 10 Read Articles in Network Security and Its Applications
October 2022: Top 10 Read Articles in Network Security & Its Applications
January 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
December 2022: Top 10 Read Articles in Network Security and Its Applications
July 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
June 2025 - Top 10 Read Articles in Network Security and Its Applications
April 2025 - Top 10 Read Articles in Network Security & Its Applications.pdf
June 2023: Top 10 Read Articles in Network Security and Its Applications
April 2023: Top 10 Read Articles in Network Security and Its Applications
May 2025 - Top 10 Read Articles in Network Security and Its Applications
May 2023: Top 10 Read Articles in Network Security and Its Applications
April 2022 - Top 10 Read Articles in Network Security and Its Applications
March 2023: Top 10 Read Articles in Network Security and Its Applications
January 2024 - Top 10 Read Articles in Network Security & Its Applications
September 2024: Top 10 Read Articles in Network Security and Its Applications
Ad

More from AIRCC Publishing Corporation (20)

PDF
Models of IT-Project Management - ijcst journal
PDF
Open Source Technology : An Emerging and Vital Paradigm in Institutions of Le...
PDF
Improved Computing Performance for Listing Combinatorial Algorithms Using Mul...
PDF
Simulation of Software Defined Networks with Open Network Operating System an...
PDF
CFP : 17th International Conference on Wireless & Mobile Network (WiMo 2025
PDF
Online Legal Service : The Present and Future
PDF
Applying Cfahp to Explore the Key Models of Semiconductor Pre-Sales
PDF
Hybrid Transformer-Based Classification for Web-Based Injection Attack Detect...
PDF
CFP : 6 th International Conference on Natural Language Processing and Applic...
PDF
Dual Edge-Triggered D-Type Flip-Flop with Low Power Consumption
PDF
Analytical Method for Modeling PBX Systems for Small Enterprise
PDF
CFP : 12th International Conference on Computer Science, Engineering and Info...
PDF
CFP: 14th International Conference on Advanced Computer Science and Informati...
PDF
Investigating the Determinants of College Students Information Security Behav...
PDF
CFP : 9 th International Conference on Computer Science and Information Techn...
PDF
CFP : 6 th International Conference on Artificial Intelligence and Machine Le...
PDF
Remotely View User Activities and Impose Rules and Penalties in a Local Area ...
PDF
April 2025-: Top Read Articles in Computer Science & Information Technology
PDF
March 2025-: Top Cited Articles in Computer Science & Information Technology
PDF
Efficient Adaptation of Fuzzy Controller for Smooth Sending Rate to Avoid Con...
Models of IT-Project Management - ijcst journal
Open Source Technology : An Emerging and Vital Paradigm in Institutions of Le...
Improved Computing Performance for Listing Combinatorial Algorithms Using Mul...
Simulation of Software Defined Networks with Open Network Operating System an...
CFP : 17th International Conference on Wireless & Mobile Network (WiMo 2025
Online Legal Service : The Present and Future
Applying Cfahp to Explore the Key Models of Semiconductor Pre-Sales
Hybrid Transformer-Based Classification for Web-Based Injection Attack Detect...
CFP : 6 th International Conference on Natural Language Processing and Applic...
Dual Edge-Triggered D-Type Flip-Flop with Low Power Consumption
Analytical Method for Modeling PBX Systems for Small Enterprise
CFP : 12th International Conference on Computer Science, Engineering and Info...
CFP: 14th International Conference on Advanced Computer Science and Informati...
Investigating the Determinants of College Students Information Security Behav...
CFP : 9 th International Conference on Computer Science and Information Techn...
CFP : 6 th International Conference on Artificial Intelligence and Machine Le...
Remotely View User Activities and Impose Rules and Penalties in a Local Area ...
April 2025-: Top Read Articles in Computer Science & Information Technology
March 2025-: Top Cited Articles in Computer Science & Information Technology
Efficient Adaptation of Fuzzy Controller for Smooth Sending Rate to Avoid Con...

Recently uploaded (20)

PDF
Anesthesia in Laparoscopic Surgery in India
PDF
RMMM.pdf make it easy to upload and study
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Computing-Curriculum for Schools in Ghana
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Classroom Observation Tools for Teachers
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
Cell Types and Its function , kingdom of life
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Pre independence Education in Inndia.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Anesthesia in Laparoscopic Surgery in India
RMMM.pdf make it easy to upload and study
Microbial disease of the cardiovascular and lymphatic systems
TR - Agricultural Crops Production NC III.pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Computing-Curriculum for Schools in Ghana
O5-L3 Freight Transport Ops (International) V1.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Renaissance Architecture: A Journey from Faith to Humanism
Classroom Observation Tools for Teachers
Supply Chain Operations Speaking Notes -ICLT Program
Cell Types and Its function , kingdom of life
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pre independence Education in Inndia.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
2.FourierTransform-ShortQuestionswithAnswers.pdf
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
FourierSeries-QuestionsWithAnswers(Part-A).pdf

TOP 5 Most View Article in Computer Science & Information Technology Research

  • 1. TTOOPP 5 MMoosstt VViieeww AArrttiiccllee iinn CCoommppuutteerr SScciieennccee && IInnffoorrmmaattiioonn TTeecchhnnoollooggyy RReesseeaarrcchh International Journal of Computer Science and Information Technology (IJCSIT) Google Scholar Citation ISSN: 0975-3826(online); 0975-4660 (Print) http://airccse.org/journal/ijcsit.html
  • 2. SECURITY THREATS ON CLOUD COMPUTING VULNERABILITIES Te-Shun Chou Department of Technology Systems, East Carolina University, Greenville, NC, U.S.A. ABSTRACT Clouds provide a powerful computing platform that enables individuals and organizations to perform variety levels of tasks such as: use of online storage space, adoption of business applications, development of customized computer software, and creation of a “realistic” network environment. In previous years, the number of people using cloud services has dramatically increased and lots of data has been stored in cloud computing environments. In the meantime, data breaches to cloud services are also increasing every year due to hackers who are always trying to exploit the security vulnerabilities of the architecture of cloud. In this paper, three cloud service models were compared; cloud security risks and threats were investigated based on the nature of the cloud service models. Real world cloud attacks were included to demonstrate the techniques that hackers used against cloud computing systems. In addition,countermeasures to cloud security breaches are presented. KEYWORDS Cloud computing, cloud security threats and countermeasures, cloud service models For More Details : http://airccse.org/journal/jcsit/5313ijcsit06.pdf Volume Link : http://airccse.org/journal/ijcsit2013_curr.html
  • 3. REFERENCES 1. DataLossDB Open Security Foundation. http://datalossdb.org/statistics 2. Sophos Security Threat Report 2012. http://www.sophos.com/ 3. Amazon.com Server Said to Have Been Used in Sony Attack, May 2011.http://www.bloomberg.com/news/2011-05-13/sony-network-said-to- have-been- invaded-by-hackersusing-amazon-com-server.html 4. D. Jamil and H. Zaki, “Security Issues in Cloud Computing and Countermeasures,” International Journal of Engineering Science and Technology, Vol. 3 No. 4, pp. 2672- 2676, April 2011. 5. K. Zunnurhain and S. Vrbsky, “Security Attacks and Solutions in Clouds,” 2nd IEEE International Conference on Cloud Computing Technology and Science, Indianapolis, December 2010. 6. W. A. Jansen, “Cloud Hooks: Security and Privacy Issues in Cloud Computing,” 44th Hawaii International Conference on System Sciences, pp. 1–10, Koloa, Hawaii, January 2011. 7. T. Roth, “Breaking Encryptions Using GPU Accelerated Cloud Instances,” Black Hat Technical Security Conference, 2011. 8. CERT Coordination Center, Denial of Service.http://www.packetstormsecurity.org/distributed/denial_of_service.html 9. M. Jensen, J. Schwenk, N. Gruschka, and L. L. Iacono, “On Technical Security Issues in Cloud Computing,” IEEE International Conference in Cloud Computing, pp. 109-116, Bangalore, 2009. 10. Thunder in the Cloud: $6 Cloud-Based Denial-of-Service Attack, August 2010.http://blogs.computerworld.com/16708/thunder_in_the_cloud_6_cloud_based_ deni al_of_service_attack 11. DDoS Attack Rains Down on Amazon Cloud, October 2009.http://www.theregister.co.uk/2009/10/05/amazon_bitbucket_outage/ 12. 2011 CyberSecurity Watch Survey, CERT Coordination Center at Carnegie Mellon University. 13. D. Catteddu and G. Hogben, “Cloud Computing Benefits, Risks and Recommendations for Information Security,” The European Network and Information Security Agency (ENISA), November 2009.
  • 4. 14. Insider Threats Related to Cloud Computing, CERT, July 2012. http://www.cert.org/ 15. Data Breach Trends & Stats, Symantec, 2012. http://www.indefenseofdata.com/data- breach-trendsstats/ 16. 2012 Has Delivered Her First Giant Data Breach, January 2012.http://www.infosecisland.com/blogview/19432-2012-Has-Delivered-Her-First- Giant-DataBreach.html 17. A Few Wrinkles Are Etching Facebook, Other Social Sites, USA Today, 2011.http://www.usatoday.com/printedition/life/20090115/socialnetworking15_st.art.h tm l 18. An Update on LinkedIn Member Passwords Compromised, LinkedIn Blog, June, 2012.http://blog.linkedin.com/2012/06/06/linkedin-member-passwords-compromised/ 19. Dropbox: Yes, We Were Hacked, August 2012. http://gigaom.com/cloud/dropbox- yes-we-werehacked/ 20. Web Based Attacks, Symantec White Paper, February 2009. 21. Symantec Internet Security Threat Report, 2011 Trends, Vol. 17, April 2012. 22. P. P. Ramgonda and R. R. Mudholkar, “Cloud Market Cogitation and Techniques to Averting SQL Injection for University Cloud,” International Journal of Computer Technology and Applications, Vol. 3, No. 3, pp. 1217-1224, January, 2012. 23. A. S. Choudhary and M. L. Dhore, “CIDT: Detection of Malicious Code Injection Attacks on Web Application,” International Journal of Computer Applications, Vol. 52, No. 2, pp. 19-26, August 2012. 24. Web Application Attack Report For The Second Quarter of 2012.http://www.firehost.com/company/newsroom/web-application-attack-report- second-quarter-2012 25. Visitors to Sony PlayStation Website at Risk of Malware Infection, July 2008.http://www.sophos.com/en-us/press-office/press- releases/2008/07/playstation.aspx 26. N. Provos, M. A. Rajab, and P. Mavrommatis, “Cybercrime 2.0: When the Cloud Turns Dark,” ACM Communications, Vol. 52, No. 4, pp. 42–47, 2009. 27. S. S. Rajan, Cloud Security Series | SQL Injection and SaaS, Cloud Computing Journal, November 2010.
  • 5. 28. Researchers Demo Cloud Security Issue With Amazon AWS Attack, October 2011. http://www.pcworld.idg.com.au/article/405419/researchers_demo_cloud_security_is sue_ amazon_aws_attack/ 29. M. McIntosh and P. Austel, “XML Signature Element Wrapping Attacks and Countermeasures,” 2005 workshop on Secure web services, ACM Press, New York, NY, pp. 20–27, 2005. 30. N. Gruschka and L. L. Iacono, “Vulnerable Cloud: SOAP Message Security Validation Revisited,” IEEE International Conference on Web Services, Los Angeles, 2009. 31. A. Tripathi and A. Mishra, “Cloud Computing Security Considerations Interface,” 2011 IEEE International Conference on Signal Processing, Communications and Computing, Xi'an, China, September 2011. 32. H. C. Li, P. H. Liang, J. M. Yang, and S. J. Chen, “Analysis on Cloud-Based Security Vulnerability Assessment,” IEEE International Conference on E-Business Engineering, pp.490-494, November 2010. 33. Amazon:Hey Spammers, Get Off My Cloud!http://voices.washingtonpost.com/securityfix/2008/07/amazon_hey_spammer s_get_off_my.html 34. W. Jansen and T. Grance, “Guidelines on Security and Privacy in Public Cloud Computing,” Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Special Publication 800-144, December 2011. 35. Tackling the Insider Threat http://www.bankinfosecurity.com/blogs.php?postID=140 36. “Cloud Security Risks and Solutions,” White Paper, BalaBit IT Security, July 2010. 37. S. J. Stolfo, M. B. Salem, and A. D. Keromytis, “Fog computing: Mitigating Insider Data Theft Attacks in the Cloud,” IEEE Symposium on Security and Privacy Workshops, pp. 125-128, San Francisco, CA, 2012. 38. M. Jensen, C. Meyer, J. Somorovsky, and J. Schwenk, “On the Effectiveness of XML Schema Validation for Countering XML Signature Wrapping Attacks,” First International Workshop on Securing Services on the Cloud, Milan, Italy, September 2011. 39. S. Gajek, M. Jensen, L. Liao, and J. Schwenk, “Analysis of Signature Wrapping Attacks and Countermeasures,” IEEE International Conference on Web Services, pp. 575–582, Miami, Florida, July 2009.
  • 6. BIG DATA IN CLOUD COMPUTING REVIEW AND OPPORTUNITIES Manoj Muniswamaiah, Tilak Agerwala and Charles Tappert Seidenberg School of CSIS, Pace University, White Plains, New York ABSTRACT Big Data is used in decision making process to gain useful insights hidden in the data for business and engineering. At the same time it presents challenges in processing, cloud computing has helped in advancement of big data by providing computational, networking and storage capacity. This paper presents the review, opportunities and challenges of transforming big data using cloud computing resources. KEYWORDS Big data; cloud computing; analytics; database; data warehouse For More Details: http://aircconline.com/ijcsit/V11N4/11419ijcsit04.pdf Volume Link: http://airccse.org/journal/ijcsit2019_curr.html
  • 7. REFERENCES [1] Konstantinou, I., Angelou, E., Boumpouka, C., Tsoumakos, D., & Koziris, N. (2011, October). On the elasticity of nosql databases over cloud management platforms. In Proceedings of the 20th ACM international conference on Information and knowledge management (pp. 2385- 2388). ACM. [2] Labrinidis, Alexandros, and Hosagrahar V. Jagadish. "Challenges and opportunities with big data." Proceedings of the VLDB Endowment 5.12 (2012): 2032-2033. [3] Abadi, D. J. (2009). Data management in the cloud: Limitations and opportunities. IEEE Data Eng. Bull, 32(1), 3-12. [4] Luhn, H. P. (1958). A business intelligence system. IBM Journal of Research and Development, 2(4), 314-319 International Journal of Computer Science & Information Technology (IJCSIT) Vol 11, No 4, August 2019 57 [5] Sivarajah, Uthayasankar, et al. "Critical analysis of Big Data challenges and analytical methods." Journal of Business Research 70 (2017): 263-286. [6] https://www.bmc.com/blogs/saas-vs-paas-vs-iaas-whats-the-difference-and-how-to-choose/ [7] Kavis, Michael J. Architecting the cloud: design decisions for cloud computing service models (SaaS, PaaS, and IaaS). John Wiley & Sons, 2014. [8] https://www.ripublication.com/ijaer17/ijaerv12n17_89.pdf [9] Sakr, S. & Gaber, M.M., 2014. Large Scale and big data: Processing and Management Auerbach, ed. [10] Ji, Changqing, et al. "Big data processing in cloud computing environments." 2012 12th international symposium on pervasive systems, algorithms and networks. IEEE, 2012. [11] Han, J., Haihong, E., Le, G., & Du, J. (2011, October). Survey on nosql database. In Pervasive Computing and Applications (ICPCA), 2011 6th International Conference on (pp. 363-366). IEEE. [12] Zhang, L. et al., 2013. Moving big data to the cloud. INFOCOM, 2013 Proceedings IEEE, pp.405–409 [13] Fernández, Alberto, et al. "Big Data with Cloud Computing: an insight on the computing environment, MapReduce, and programming frameworks." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery 4.5 (2014): 380-409. [14] http://acme.able.cs.cmu.edu/pubs/uploads/pdf/IoTBD_2016_10.pdf [15] Xiaofeng, Meng, and Chi Xiang. "Big data management: concepts, techniques and challenges [J]." Journal of computer research and development 1.98 (2013): 146-169. [16] Muniswamaiah, Manoj & Agerwala, Tilak & Tappert, Charles. (2019). Challenges of Big Data Applications in Cloud Computing. 221-232. 10.5121/csit.2019.90918.
  • 8. AN ALGORITHM FOR PREDICTIVE DATA MINING APPROACH IN MEDICAL DIAGNOSIS Shakuntala Jatav1 and Vivek Sharma2 1 M.Tech Scholar, Department of CSE, TIT College, Bhopal 2 Professor, Department of CSE, TIT College, Bhopal ABSTRACT The Healthcare industry contains big and complex data that may be required in order to discover fascinating pattern of diseases & makes effective decisions with the help of different machine learning techniques. Advanced data mining techniques are used to discover knowledge in database and for medical research. This paper has analyzed prediction systems for Diabetes, Kidney and Liver disease using more number of input attributes. The data mining classification techniques, namely Support Vector Machine(SVM) and Random Forest (RF) are analyzed on Diabetes, Kidney and Liver disease database. The performance of these techniques is compared, based on precision, recall, accuracy, f_measure as well as time. As a result of study the proposed algorithm is designed using SVM and RF algorithm and the experimental result shows the accuracy of 99.35%, 99.37 and 99.14 on diabetes, kidney and liver disease respectively. KEYWORDS Data Mining, Clinical Decision Support System, Disease Prediction, Classification, SVM, RF. For More Details : http://aircconline.com/ijcsit/V10N1/10118ijcsit02.pdf Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
  • 9. REFERENCES [1] Nidhi Bhatla, Kiran Jyoti, “An Analysis of Heart Disease Prediction using Different Data Mining Techniques”,IJERT,Vol 1, Issue 8, 2012. [2] Syed Umar Amin, Kavita Agarwal, Rizwan Beg, “Genetic Neural Network based Data Mining in Prediction of Heart Disease using Risk Factors”, IEEE, 2013. [3] A H Chen, S Y Huang, P S Hong, C H Cheng, E J Lin, “HDPS: Heart Disease Prediction System”, IEEE, 2011. [4] M. Akhil Jabbar, B. L Deekshatulu, Priti Chandra, “Heart Disease Prediction using Lazy Associative Classification”, IEEE, 2013. [5] Chaitrali S. Dangare, Sulabha S. Apte, “Improved Study of Heart Disease Prediction System using Data Mining Classification Techniques”, IJCA, Volume 47– No.10, June 2012. [6] P. Bhandari, S. Yadav, S. Mote, D.Rankhambe, “Predictive System for Medical Diagnosis with Expertise Analysis”, IJESC, Vol. 6, pp. 4652-4656, 2016. [7] Nishara Banu, Gomathy, “Disease Forecasting System using Data Mining Methods”, IEEE Transaction on Intelligent Computing Applications, 2014. [8] A. Iyer, S. Jeyalatha and R. Sumbaly, “Diagnosis of Diabetes using Classification Mining Techniques”, IJDKP, Vol. 5, pp. 1-14, 2015. [9] Sadiyah Noor Novita Alfisahrin and Teddy Mantoro, “Data Mining Techniques for Optimatization of Liver Disease Classification”, International Conference on Advanced Computer Science Applications and Technologies, IEEE, pp. 379-384, 2013. [10] A. Naik and L. Samant, “Correlation Review of Classification Algorithm using Data Mining Tool: WEKA, Rapidminer , Tanagra ,Orange and Knime”, ELSEVIER, Vol. 85, pp. 662- 668, 2016. [11] Uma Ojha and Savita Goel, “A study on prediction of breast cancer recurrence using data mining techniques”, International Conference on Cloud Computing, Data Science & Engineering, IEEE, 2017. [12] Naganna Chetty, Kunwar Singh Vaisla, Nagamma Patil, “An Improved Method for Disease Prediction using Fuzzy Approach”, International Conference on Advances in Computing and Communication Engineering, IEEE, pp. 568-572, 2015. [13] Kumari Deepika and Dr. S. Seema, “Predictive Analytics to Prevent and Control Chronic Diseases”, International Conference on Applied and Theoretical Computing and Communication Technology, IEEE, pp. 381-386, 2016. [14] Emrana Kabir Hashi, Md. Shahid Uz Zaman and Md. Rokibul Hasan, “An Expert Clinical Decision Support System to Predict Disease Using Classification Techniques”, IEEE,2017
  • 10. CONVOLUTIONAL NEURAL NETWORK BASED FEATURE EXTRACTION FOR IRIS RECOGNITION Maram.G Alaslani1 and Lamiaa A. Elrefaei1,2 1 Computer Science Department, Faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia 2 Electrical Engineering Department, Faculty of Engineering at Shoubra, Benha University, Cairo, Egypt ABSTRACT Iris is a powerful tool for reliable human identification. It has the potential to identify individuals with a high degree of assurance. Extracting good features is the most significant step in the iris recognition system. In the past, different features have been used to implement iris recognition system. Most of them are depend on hand-crafted features designed by biometrics specialists. Due to the success of deep learning in computer vision problems, the features learned by the Convolutional Neural Network (CNN) have gained much attention to be applied for iris recognition system. In this paper, we evaluate the extracted learned features from a pre-trained Convolutional Neural Network (Alex-Net Model) followed by a multi-class Support Vector Machine (SVM) algorithm to perform classification. The performance of the proposed system is investigated when extracting features from the segmented iris image and from the normalized iris image. The proposed iris recognition system is tested on four public datasets IITD, iris databases CASIAIris-V1, CASIA-Iris-thousand and, CASIA-Iris- V3 Interval. The system achieved excellent results with the very high accuracy rate. KEYWORDS Biometrics, Iris, Recognition, Deep learning, Convolutional Neural Network (CNN), Feature extraction (FE). For More Details : http://aircconline.com/ijcsit/V10N2/10218ijcsit06.pdf Volume Link: http://airccse.org/journal/ijcsit2018_curr.html
  • 11. REFERENCES [1] M. Haghighat, S. Zonouz, and M. Abdel-Mottaleb, "CloudID: Trustworthy cloud-based and crossenterprise biometric identification," Expert Systems with Applications, vol. 42, pp. 7905-7916, 2015. [2] D. Kesavaraja, D. Sasireka, and D. Jeyabharathi, "Cloud software as a service with iris authentication," Journal of Global Research in Computer Science, vol. 1, pp. 16-22, 2010. [3] N. Shah and P. Shrinath, "Iris Recognition System–A Review," International Journal of Computer and Information Technology, vol. 3, 2014. [4] A. B. Dehkordi and S. A. Abu-Bakar, "A review of iris recognition system," Jurnal Teknologi, vol. 77, 2015. [5] S. Minaee, A. Abdolrashidiy, and Y. Wang, "An experimental study of deep convolutional features for iris recognition," in Signal Processing in Medicine and Biology Symposium (SPMB), 2016 IEEE, 2016, pp. 1-6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 10, No 2, April 2018 77 [6] S. Minaee, A. Abdolrashidi, and Y. Wang, "Iris recognition using scattering transform and textural features," in Signal Processing and Signal Processing Education Workshop (SP/SPE), 2015 IEEE, 2015, pp. 37-42. [7] S. Minaee, A. Abdolrashidi, and Y. Wang, "Face Recognition Using Scattering Convolutional Network," arXiv preprint arXiv:1608.00059, 2016. [8] IIT Delhi Database. Available: http://www4.comp.polyu.edu.hk/~csajaykr/IITD/Database_Iris.htm. Accessed 14 April 2017. [9] ( 2 April2017). CASIA Iris Image Database Version 1.0. Available: http://www.idealtest.org/findDownloadDbByMode.do?mode=Iris. Accessed 12 April 2017. [10] CASIA Iris Image Database Version 4.0 (CAS IA-Iris-Thousand). Available: http://biometrics.idealtest.org/dbDetailForUser.do?id=4. Accessed 17 April 2017. [11] CASIA Iris Image Database Version 3.0 (CASIA-Iris-Interval). Available: http://biometrics.idealtest.org/dbDetailForUser.do?id=3. Accessed 17April2017. [12] K. Nguyen, C. Fookes, A. Ross, and S. Sridharan, "Iris Recognition with Off-the-Shelf CNN Features: A Deep Learning Perspective," IEEE Access, 2017. [13] A. Romero, C. Gatta, and G. Camps-Valls, "Unsupervised deep feature extraction for remote sensing image classification," IEEE Transactions on Geoscience and Remote Sensing, vol. 54, pp. 1349-1362, 2016.
  • 12. [14] O. Oyedotun and A. Khashman, "Iris nevus diagnosis: convolutional neural network and deep belief network," Turkish Journal of Electrical Engineering & Computer Sciences, vol. 25, pp. 1106-1115, 2017. [15] A. S. Al-Waisy, R. Qahwaji, S. Ipson, S. Al-Fahdawi, and T. A. Nagem, "A multi-biometric iris recognition system based on a deep learning approach," Pattern Analysis and Applications, pp. 1-20, 2017. [16] J. Nagi, F. Ducatelle, G. A. Di Caro, D. Cireşan, U. Meier, A. Giusti, F. Nagi, J. Schmidhuber, and L. M. Gambardella, "Max-pooling convolutional neural networks for vision-based hand gesture recognition," in Signal and Image Processing Applications (ICSIPA), 2011 IEEE International Conference on, 2011, pp. 342-347. [17] D. Scherer, A. Müller, and S. Behnke, "Evaluation of pooling operations in convolutional architectures for object recognition," Artificial Neural Networks–ICANN 2010, pp. 92-101, 2010. [18] J. van Doorn, "Analysis of deep convolutional neural network architectures," 2014. [19] C. L. Lam and M. Eizenman, "Convolutional neural networks for eye detection in remote gaze estimation systems," 2008. [20] S. Ahmad Radzi, K.-H. Mohamad, S. S. Liew, and R. Bakhteri, "Convolutional neural network for face recognition with pose and illumination variation," International Journal of Engineering and Technology (IJET), vol. 6, pp. 44-57, 2014. [21] K. Itqan, A. Syafeeza, F. Gong, N. Mustafa, Y. Wong, and M. Ibrahim, "User identification system based on finger-vein patterns using Convolutional Neural Network," ARPN Journal of Engineering and Applied Sciences, vol. 11, pp. 3316-3319, 2016. [22] S. Sangwan and R. Rani, "A Review on: Iris Recognition," (IJCSIT) International Journal of Computer Science and Information Technologies, vol. 6, pp. 3871-3873, 2015 [23] C. Jayachandra and H. V. Reddy, "Iris Recognition based on Pupil using Canny edge detection and KMeans Algorithm," Int. J. Eng. Comput. Sci., vol. 2, pp. 221-225, 2013. [24] L. A. Elrefaei, D. H. Hamid, A. A. Bayazed, S. S. Bushnak, and S. Y. Maasher, "Developing Iris Recognition System for Smartphone Security," Multimedia Tools and Applications, pp. 1-25, 2017. [25] A. Krizhevsky, I. Sutskever, and G. E. Hinton, "Imagenet classification with deep convolutional neural networks," in Advances in neural information processing systems, 2012, pp. 1097-1105. [26] S. Minaee and Y. Wang, "Palmprint Recognition Using Deep Scattering Convolutional Network," arXiv preprint arXiv:1603.09027, 2016.
  • 13. [27] J. Weston and C. Watkins, "Multi-class support vector machines," Technical Report CSD- TR-98-04, Department of Computer Science, Royal Holloway, University of London, May1998. [28] G. Xu, Z. Zhang, and Y. Ma, "A novel method for iris feature extraction based on intersecting cortical model network," Journal of Applied Mathematics and Computing, vol. 26, pp. 341-352, 2008. [29] M. Abhiram, C. Sadhu, K. Manikantan, and S. Ramachandran, "Novel DCT based feature extraction for enhanced iris recognition," in Communication, Information & Computing Technology (ICCICT), 2012 International Conference on, 2012, pp. 1-6. [30] M. Elgamal and N. Al-Biqami, "An efficient feature extraction method for iris recognition based on wavelet transformation," Int. J. Comput. Inf. Technol, vol. 2, pp. 521-527, 2013. [31] B. Bharath, A. Vilas, K. Manikantan, and S. Ramachandran, "Iris recognition using radon transform thresholding based feature extraction with Gradient-based Isolation as a pre- processing technique," in Industrial and Information Systems (ICIIS), 2014 9th International Conference on, 2014, pp. 1-8. [32] S. S. Dhage, S. S. Hegde, K. Manikantan, and S. Ramachandran, "DWT-based feature extraction and radon transform based contrast enhancement for improved iris recognition," Procedia Computer Science, vol. 45, pp. 256-265, 2015. AUTHORS Maram G. Alaslani Received her B.Sc. degree in Computer Science with Honors from King Abdulaziz University in 2010. She works as Teaching Assistant from 2011 to date at Faculty of Computers and Information Technology at King Abdulaziz University, Rabigh, Saudi Arabia. Now she is working in her Master Degree at King Abdulaziz University, Jeddah, Saudi Arabia. She has a research interest in image processing, pattern recognition, and neural network.. Lamiaa A. Elrefaei received her B.Sc. degree with honors in Electrical Engineering (Electronics and Telecommunications) in 1997, her M.Sc. in 2003 and Ph.D. in 2008 in Electrical Engineering (Electronics) from faculty of Engineering at Shoubra, Benha University, Egypt. She held a number of faculty positions at Benha University, as Teaching Assistant from 1998 to 2003, as an Assistant Lecturer from 2003 to 2008, and has been a lecturer from 2008 to date. She is currently an Associate Professor at the faculty of Computing and Information Technology, King Abdulaziz University, Jeddah, Saudi Arabia. Her research interests include computational intelligence, biometrics, multimedia security, wireless networks, and Nano networks. She is a senior member of IEEE..
  • 14. DIAGONAL BASED FEATURE EXTRACTION FOR HANDWRITTEN ALPHABETS RECOGNITION SYSTEM USING NEURAL NETWORK J.Pradeep1 , E.Srinivasan2 and S.Himavathi3 1,2 Department of ECE, Pondicherry College Engineering, Pondicherry, India. 3 Department of EEE, Pondicherry College Engineering, Pondicherry, India. ABSTRACT An off-line handwritten alphabetical character recognition system using multilayer feed forward neural network is described in the paper. A new method, called, diagonal based feature extraction is introduced for extracting the features of the handwritten alphabets. Fifty data sets, each containing 26 alphabets written by various people, are used for training the neural network and 570 different handwritten alphabetical characters are used for testing. The proposed recognition system performs quite well yielding higher levels of recognition accuracy compared to the systems employing the conventional horizontal and vertical methods of feature extraction. This system will be suitable for converting handwritten documents into structural text form and recognizing handwritten names KEYWORDS Handwritten character recognition, Image processing, Feature extraction, feed forward neural networks. . For More Details : http://airccse.org/journal/jcsit/0211ijcsit03.pdf Volume Link : http://airccse.org/journal/ijcsit2011_curr.html
  • 15. REFERENCES [1] S. Mori, C.Y. Suen and K. Kamamoto, “Historical review of OCR research and development,” Proc. of IEEE, vol. 80, pp. 1029-1058, July 1992. [2] S. Impedovo, L. Ottaviano and S. Occhinegro, “Optical character recognition”, International Journal Pattern Recognition and Artificial Intelligence, Vol. 5(1-2), pp. 1-24, 1991. [3] V.K. Govindan and A.P. Shivaprasad, “Character Recognition – A review,”Pattern Recognition, vol. 23, no. 7, pp. 671- 683, [4] R. Plamondon and S. N. Srihari, “On-line and off- line handwritten character recognition: A comprehensive survey,”IEEE. Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 63-84, 2000. [5] N. Arica and F. Yarman-Vural, “An Overview of Character Recognition Focused on Off-line Handwriting”, IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 2001, 31(2), pp. 216 - 233. [6] U. Bhattacharya, and B. B. Chaudhuri, “Handwritten numeral databases of Indian Scripts and multistage recognition of mixed numerals,” IEEE Transaction on Pattern analysis and machine intelligence, vol.31, No.3, pp.444-457, 2009. [7] U. Pal, T. Wakabayashi and F. Kimura, “Handwritten numeral recognition of six popular scripts,” Ninth International conference on Document Analysis and Recognition ICDAR 07, Vol.2, pp.749-753, 2007. [8] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 18, No.7, July 1996, pp. 690-706. [9] Anil.K.Jain and Torfinn Taxt, “Feature extraction methods for character recognitionA Survey,” Pattern Recognition, vol. 29, no. 4, pp. 641-662, 1996. [10] R.G. Casey and E.Lecolinet, “A Survey of Methods and Strategies in Character Segmentation,” IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 18, No.7, July 1996, pp. 690-706. [11] C. L. Liu, H. Fujisawa, “Classification and Learning for Character Recognition:Comparison of Methods and Remaining Problems”, Int. Workshop on Neural Networks and Learning in Document Analysis and Recognition, Seoul, 2005.
  • 16. [12] F. Bortolozzi, A. S. Brito, Luiz S. Oliveira and M. Morita, “Recent Advances in Handwritten Recognition”, Document Analysis, Umapada Pal, Swapan K. Parui, Bidyut B. Chaudhuri, pp 1-30. [13] Anita Pal & Dayashankar Singh, “Handwritten English Character Recognition Using Neural,” Network International Journal of Computer Science & Communication.vol. 1,No. 2, July-December 2010, pp. 141-144. [14] Dinesh Acharya U, N V Subba Reddy and Krishnamurthy, “Isolated handwritten Kannada numeral recognition using structural feature and K-means cluster,” IISN- 2007, pp-125 -129. [15] N. Sharma, U. Pal, F. Kimura, "Recognition of Handwritten Kannada Numerals", 9thInternational Conference on Information Technology (ICIT'06), ICIT, pp. 133- 136. [16] Rafael C. Gonzalez, Richard E. woods and Steven L.Eddins, Digital Image Processing using MATLAB, Pearson Education, Dorling Kindersley, South Asia, 2004. [17] S.V.Rajashekararadhya, and P.VanajaRanjan, “Efficient zone based feature extraction algorithm for handwritten numeral recognition of four popular south- Indian scripts,” Journal of Theoretical and Applied Information Technology, JATIT vol.4, no.12, pp.1171-1181, 2008.