AES-Based Encoding and Decoding Images using MATLAB
A Novel Technique of Sign Language Recognition System using Machine Learning for Differently Abled Person
Implementation of Machine Learning Techniques for Depression in Text Messages: A Survey
A Study of Ransomware Attacks on Windows Platform
Techniques of Migration in Live Virtual Machine and its Challenges
Efficient Agent Based Priority Scheduling and LoadBalancing Using Fuzzy Logic in Grid Computing
A Survey of Various Task Scheduling Algorithms In Cloud Computing
A Viable Solution to Prevent SQL Injection Attack Using SQL Injection
A Computational Intelligence Technique for Effective Medical Diagnosis Using Decision Tree Algorithm
Integrated Atlas Based Localisation Features in Lungs Images
While ageing has a major impact on human health and the economy, little is known about its molecular basis: control and mechanism. More than 300 genes have been linked to human ageing to date (almost all of them function as protein-coding genes). Individual genes or small subsets of these genes linked to ageing have been extensively studied, but overall study of these genes has been restricted. To fill this gap, we looked at different applications of modern artificial intelligence (AI) algorithms in the field of ageing science. Biological Age (BA), also known as the hypothetical underlying age of an organism, has been calculated using a number of machine learning algorithms. Different circulating and non-circulating biomarkers can be used to calculate BA. Based on our study, we expect modern machine learning (ML) models to contribute to the reputation and prominence of healthcare and pharmaceutical longevity biotechnology, as well as the convergence of numerous fields of research. In this paper, we used a variety of machine learning algorithms on the skin fibroblasts cells dataset because it is ideal for age prediction studies for several reasons. These skin fibroblasts contain age-related disruption, contain age-dependent phenotypic, epigenomic, and transcriptomic changes, and it is easy to collect using non-invasive techniques. By using various machine learning models like elastic net, random forest regressor, support vector regressor and artificial neural network for calculating the accuracy of these models on the dataset, we obtain an accuracy of 72 percent with elastic net.
Nowadays, human identification is required for daily routine activities such as entering secured locations in addition to many other applications. To achieve biometric verification, higher security levels with easier user interaction is needed. Biometric verification help identifying people based on their extracted physical or behavioural features. These features should have certain properties such as uniqueness, permanence, acceptability, collectability, and affordable cost to employ any biometric system. Handwritten signatures are treated as the most natural method of verifying a person's identity as compared to other biometric and cryptographic forms of verification. The learning process inherent in Neural Networks (NN) can be applied to the process of verifying handwritten signatures. This paper presents a method for verifying handwritten signatures by using a Neural Network architecture. Various static (e.g., height, slant, etc.) and dynamic (e.g., velocity, pen tip pressure, etc.) signature features are extracted and used to train the NN. The normal Handwritten Signature Verification (HSV) uses image processing technique to verify the signatures. This takes much processing and time to differentiate the genuine and forged signatures. Keeping this in mind, we refurbished the existing system and made necessary improvements to modernize the processes. Such as through Deep Learning techniques, we can deal with signature verification more accurately as it has many algorithms to check the accuracy of the results.
In recent times, various academic or non-academic events are conducted virtually by most of the colleges/institutions/ organizations/schools, to disseminate new concepts and ideas where the participating individuals can gain knowledge in respective disciplines. A software which does the functions done by an event manager is said to be an online event management system. The idea behind this proposed work is to make the participants, student coordinator, event organizing staff/faculty coordinators and head of the department to access the event, effortlessly. The aim of the project is to automate all event activities right from event registration to certificate distribution. Manual exertion will be automated and no workload will exist among the organizers and participants, so that the college management could plan the events online and student volunteers could be assigned tasks transparently. Students will be able to register for multiple events from various colleges and book themselves for the event through this application. Furthermore, students will be able to track their past events and to attend quiz competitions from their app itself. The authenticity of students for their registration and payment status can be verified through QR Scanner and also the students can attend the event using the QR Code. Real time communication between the students and the event organizers can be achieved through this proposed work.
Parallel and multiprocessor computing has always been considered as the pioneer machines for speed, performance and optimization. Of course, to run such hardcore machines, sophisticated software, known as Operating Systems (OS) are required. In this paper some well known operating system which are specifically developed and used for parallel and multiprocessor computing have been reviewed. Specific functionalities of the OS kernels such as interprocess communication, architectures and memory management have been discussed in this survey paper.
Recently, security in software is becoming complex, especially in distributed computing. A secured and trusted environment is critically important for distributed computing. Different services and resources in the distributed system have to be secure at different levels; therefore, in this paper, we have analyzed in detail the flaws of the distributed systems, common security threats, common scenarios at which the system faces risk, and the best possible solutions to secure the distributed system. Globus security mechanism is discussed in detail as how the authentication can be done and how message confidentiality and integrity can be achieved. Every idea that radiates all sorts of solutions to this matter is verified and analyzed. This paper provides necessary knowledge to help one understand the meaning of a secure system, the security policies, and the security mechanism.