Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Computer Forensics involves identification of computer crimes and finding solutions for them by using analytical and investigative techniques. These analytical and investigative techniques involve the acquisition, analysis and documentation of computer data related to crimes. This paper describes the computer forensics, security issues in computer and network, types of computer crimes, examples of computer crimes, tools of computer forensics, cyber laws, courses and career in computer forensics.
Over the years, data study was focused on finding proofs using rough datasets which made data mining to jump into, to show its strengths. This field gave the researchers a pictorial view of trends and patterns that can help in predictive maintenance. Algorithms available in past are unable to handle rough datasets; especially when major issues were processing data in advance and making an understandable model. Association rules were made to predict the correlation between the attributes. The current study mainly focuses on the trends followed by the “car evaluation dataset attributes” to give a suitable rating for a car. Arules library in “R” is used to reflect the same as well as some preprocessing is done. The results are then compared with “Step Induction Association Rule Mining” i.e. advancement done as well as orange classifier. The results clearly reflect that rules formed can help in predictive analysis of a car by knowing its features and specifications and the step induction rules give more clarity about the predictions.
The Development of multimedia applications makes digital media to bring about conveniences to the people by easy processing of data. At the same time, it enables the illegal attackers to attack the works. For the protection of data, there has been growing interest in developing effective techniques to discourage the unauthorized duplication of digital data. Among Cryptography and Steganography, only the watermarking provides the copyright protection and authentication. This paper is a comprehensive review of diverse image processing methods and enormous number of interrelated solicitations in various disciplines, including various watermarking techniques. In this paper, different existing techniques are discussed along with their drawbacks, also explaining their future scope.
The discovery of Association Rules (AR) acquire an imperative rule in Data Mining, which tries to find correlation among the attributes in a database. Classical Association Rules are meant for Boolean data and they suffer from a sharp boundary problem in handling quantitative data. Thereby, Fuzzy Association Rules (FAR) with fuzzy minimum support and confidence is introduced. In Fuzzy Association Rule Mining (FARM), determining fuzzy sets, tuning membership functions and automatic design of fuzzy sets are prominent objectives. Hence, FARM can be viewed as a multi-objective optimization problem. In this paper, different algorithms for FARM are discussed with merits and demerits.
While moving away from traditional approaches to build software and design software architecture, the authors realized that it is sensible to migrate to a platform of better fundamental approach. This refers to the way one looks at the analysis and design of any software. This helps one to weave into the system's architecture itself like different qualities such as adaptability, extensibility, scalability and stability over time, than worrying about them at a much later stage. Such architecture will compel developers to find fixes to address the issues related to such quality factors; this approach usually culminates in creating projects that incur very high costs and unprecedented consequences that are bad and unwanted.