Sciweavers

IAJIT
2016
48views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Binary data comparison using similarity indices and principal components analysis
: This work is a study of binary data, especially binary images sources of information widely used. In general, comparing two binary images that represent the same content is not a...
Nouhoun Kane, Khalid Aznag, Ahmed El Oirrak, Moham...
IAJIT
2016
46views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Mahalanobis distance-the ultimate measure for sentiment analysis
: In this paper, Mahalanobis Distance (MD) has been proposed as a measure to classify the sentiment expressed in a review document as either positive or negative. A new method for ...
Valarmathi Balasubramanian, Srinivasa Gupta Nagara...
IAJIT
2016
40views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Secure verification technique for defending IP spoofing attacks
: The Internet Protocol (IP) is the source of Internet transmission but an inadequate authentication technique paves a way for IP spoofing. Since, IP spoofing initiates more attack...
Alwar Rengarajan, Rajendran Sugumar, Chinnappan Ja...
IAJIT
2016
61views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Data mining perspective: prognosis of life style on hypertension and diabetes
: In the present era, the data mining techniques are widely and deeply useful as decision support systems in the fields of health care systems. The proposed research is an interdis...
Abdullah A. Aljumah, Mohammad Khubeb Siddiqui
IAJIT
2016
49views Biometrics» more  IAJIT 2016»
10 years 1 months ago
Performance comparison of neuro-fuzzy cloud intrusion detection systems
: Cloud computing is a subscription-based service where we can obtain networked storage space and computer resources. Since access to cloud is through internet, data stored in clou...
Sivakami Raja, Saravanan Ramaiah