Browsing by Author "N, Radha"
Now showing 1 - 7 of 7
- Results Per Page
- Sort Options
Item ANALYZING DATAMINING ALGORITHMS USING CAR DATASET(CiiT International Journal of Data Mining and Knowledge Engineering, 2009-09) R, Deepalakshmi; N, RadhaThe “Car Manufacturing” sector occupies a prime position in the development of automobile industry. In this paper, a proposed data mining application in car manufacturing domain is explained and experimented. The datasets are retrieved from UCI Machine learning repository. The purpose of this paper is to establish a classifier that is much more reliable in classifications for future objects. The classifier should provide sophisticated prediction to indicate the car data for a new input instance with some attributes, such as car type, body-style, horsepower and fuel. Such analysis helps in providing car market with base for more accurate result for the future market. The physical characteristics of a car viz. aspiration, number of doors, body-style, normalized losses, car-type, drive wheels, engine-location, wheel-base, curb-weight, horse-power, bore, stroke, city-mpg, highway-mpg, price, engine size, etc., are considered to determine the performance of a car. Hence development of such a classifier, though a voluminous task, is immensely essential in car manufacturing realm. Machine learning techniques can help in the integration of computer-based systems in predicting the quality of car and to improve the efficiency of the system. The classification models were trained by using 214 datasets. The predicted values for the classifiers were evaluated using 10-fold cross validation and the results were compared.Item FINGERPRINT BIO-CRYPTO KEY GENERATION USING SCALE INVARIANT FEATURE TRANSFORM (SIFT)(International Research Journal of engineering and technology(IJERT), 2016-11) R, Partheeba; N, RadhaNetwork security has become a great threat to the network accessible resources that consists of policies to prevent, monitor unauthorized access, modification, and misuse of computer network. Several algorithms and techniques were proposed for the secure transmission of data and to protect user’s privacy. Secret-key cryptography and public-key cryptography are the techniques used for the protection of security issues. However, such a key need to be stored in a protected place or it should be transported by a shared communication line. So, generation of cryptographic key using biometric traits of both sender and receiver during communication avoids key storing and improves security strength. The proposed approach for detecting the quality of fingerprint by using the method called orientation certainty level (OCL). If the image has good quality then feature extraction will be done using Scale Invariant Feature Transform, otherwise poor-quality image will get ignored. By using cover image, the obtained cancellable template will get hidden. Then the hidden image will be transmitted from sender to receiver and receiver to receiver to sender by using Variable Least Significant Bit techniques. Finally, the performance metrics like FAR (False Acceptance Rate), FRR (False Rejection Rate), and Accuracy of the proposed work is compared with the existing system.Item PERFORMANCE ANALYSIS OF SUPERVISED MACHINE LEARNING ALGORITHMS FOR INSULIN DEFICIENCY DISORDER(RVS College of Engineering and Technology, Sulur, 2010-06-12) T, Rubya; N, Radha; S, Shantha KumariData mining techniques are used to manipulate the existing a large volume of data. Biomedical datasets pretense an elite challenge for machine learning and data mining techniques in order to extract accurate, understandable and hidden knowledge. This paper extensively investigates the role of a biomedical dataset (diabetes dataset) has been taken for finding the classification accuracy of that disease. Diabetes is a common disorder caused by a lack of insulin or insulin resistance leading to impaired glucose metabolism. Glucose (a simple sugar) is the key component used by the body’s cells to make energy. In order for glucose to move from the blood into most cells insulin is required (exceptions are the brain and exercising muscles). Insulin is a hormone made in the cells of the pancreas and is secreted into the blood in response to the blood glucose level increasing. According to that the whole dataset were classified to predict the accuracy of disease. The data are retrieved from the real time environmental setup especially it consists of information about glucose, cholesterol and insulin secretion level in blood. These are all considered as attributes. Machine learning provides methods techniques and tools, which help to learn automatically and to make accurate predictions based on past observations. The data mining classification algorithms of Weka were used to classify the data. The predicted values of the classifiers were evaluated using Weka tool with respect to the specific algorithms. Comparison has been made among various algorithms from three different categories of classifiers such that Function, Rule, and Meta. In this paper the conclusion is made as to infer which algorithm provides the maximum accuracy of the disease.Item SECURE AND ATTACK AWARE ROUTING IN MOBILE AD HOC NETWORKS AGAINST WORMHOLE AND SINKHOLE ATTACKS(by CONFYY in association with PPG institute of technology Coimbatore, 2017-10-19) D, Sasirekha; N, RadhaThe inherent characteristics of Mobile Ad hoc network (MANET) such as dynamic topology, limited bandwidth, limited power supply, infrastructure less network make themselves attractive for a wide spectrum of applications and vulnerable to security attacks. Sinkhole attack is the most disruptive routing layer attack. Sinkhole nodes attract all the traffic towards them to setup further active attacks such as Black hole, Gray hole and wormhole attacks. Sinkhole nodes need to be isolated from the MANET as early as possible. In this paper, an effective mechanism is proposed to prevent and detect sinkhole and wormhole attacks in MANET. The proposed work detects and punishes the attacker nodes using different techniques such as node collusion technique, which classifies a node as an attacker node only with the agreement with the neighboring nodes. When the node suspects the existence of attacker or sinkhole node in the path, it joins together with neighboring nodes to determine the sinkhole node. In the prevention of routing attacks, the proposed system introduces a route reserve method; new routes learnt are updated in the routing table of the node only after ensuring that the route does not contain the attacker nodes. The proposed system effectively modifies Ad hoc on demand Distance Vector (AODV) with the ability to detect and prevent the sinkhole and wormhole attack, so the modified protocol is named as Attack Aware Alert (A3AODV). The experiments are carried out in NS2 simulator, and the result shows the efficiency in terms of packet delivery ratio and routing overheadItem SECURING RETINA FUZZY VAULT SYSTEM USING SOFT BIOMETRICS(Global Journal of Computer Science and Technology, 2010-09) N, Radha; S, Karthikeyan; P, AnupriyaThe major concern of almost all the verification system is user authentication and security. This necessitates the development of a mechanism that ensures user security and privacy. A lot of research has been carried on this developing field and numerous techniques have been proposed earlier in literature. These traditional methods use tokens and passwords to provide security to the users. Uncertainly, it can be easily compromised by attackers and therefore it is significant to design verification system that ensures authentication. In recent years, technology has turned in favor of combining soft biometrics and cryptographic key generation technique. The principal feature of using soft biometric template is that it cannot be easily revoked by any unauthorized user. Most commonly used soft biometric features are iris, retina, face, fingerprint, voice and so on. Fuzzy vault is the framework which comprises of the combination of soft biometrics and cryptographic key generation technique. This fuzzy vault acts as an additional layer of security. This overcomes the limitation met by a biometrics system when implemented individually. This paper proposes a biometric verification system investigating the combined usage of soft biometrics features hardened by fuzzy vault scheme. This approach uses retina as a soft biometric since it is capable of providing best results. Experiments were conducted to investigate the performance of the proposed authentication system in ensuring the user security and privacy.Item A STUDY OF TECHNIQUES ON SECURING PATIENT CONFIDENTIAL INFORMATION BY USING ECG STEGANOGRAPHY(International Journal of Engineering Research and Applications (IJERA), 2017-11) B, Sivaranjani; N, RadhaBreaches and identity theft of medical data are on the rise. The advancement of electronic medical records has raised new concerns about privacy, balanced, duplication of services and medical errors. Modern issues include the degree of disclosure of information to insurance companies, employers, and other third parties. Medical privacy is the practice of maintaining the security and confidentiality of patient records. Several algorithms and techniques were proposed for the secured transmission of data and to protect user’s privacy. Cryptography and steganography are the two major protection mechanisms that are defined for the protection of security issues where biometric form of security is provided using ECG Signal. In this paper, a study of various techniques used for securing data and how biometrics were used for the hiding data are discussed.Item A STUDY ON BIOMETRIC TEMPLATE SECURITY(ICTACT Journal on Soft Computing, 2010-01) N, Radha; S, KarthikeyanThe increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.). Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys).Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems