IJCTA-Volume 8 Issue 5 / September-October 2017
Title/Author Name
Page No
A Survey on Access Control Mechanism used In Cloud Computing
-Anjali soni,Dr.Sanjay Silakari,Prof.Uday Chaurasia
This paper deals with numerous access control mechanisms that square measure present in cloud computing. Cloud computing is that the rising technology wherever resources square measure offered pay as you go basis. Cloud storage technology provides the big pool of storage capability to the cloud users. Providing security to the info keeps in cloud is that the major concern. Thus Security is increased by providing access control to the approved users. Access control provides the authorization to the users which supplies the access privileges on knowledge and different resources. Access control is enabled in most of the computing atmosphere like Peer to look, Grid and Cloud. Cloud storage services square measure accessed through a cloud storage entryway. We have a tendency to present numerous kinds of access control mechanisms that square measure utilized in cloud computing atmosphere.
Keywords—Access control, DAC, MAC, RBAC, ABE and HABE.
An Offline Arabic Handwritten Character Recognition System using Template Matching
-Saud M. Maghrabi
This paper proposes computerized offline handwritten Arabic text recognition method using template matching technique based on 2-D normalized cross-correlation. The objective of this research is to find efficient and accurate handwriting Arabic text recognition algorithm, which can accept handwriting input and recognize handwritten character entered in the computer using template matching technique. The recognition process consists of five stages: input capture, image preprocessing, line segmentation, feature extraction, character recognition. These stages are implemented in MATLAB R2017a version. Experimental results demonstrate the recognition adequacy isolated test dataset with a general exactness of 97% for Arabic handwritten characters.
Keywords : Template matching, Normalized Cross-Correlation, Arabic handwriting recognition
Role of Ethnography in Research in Computer Application
-Dr. Sampada Gulavani,Dr. R.V. Kulkarni
Ethnography is description of people or culture and record data about the culture being studied. Ethnography is undertaken in order to produce a theory or it can be served as a test-bed for theories. For ethnography, researcher uses different data generation methods like interview, observation and field notes. In ethnography research, researcher prefers field notes which contain substance, methodology and analysis which acts as a source of evidence and a basis for data analysis in the writing up of the ethnography. Type of ethnographer to be selected is a choice of researcher. Ethnography is said to be successful, if its readers are able to understand the activities of people in other culture and see that they make sense within the context of that culture. By applying ethnographic methods in computer application requires a careful design so that they are implemented correctly and important aspects are highlighted in the results.
Keywords : Research, Action research, ethnography, types of ethnography, computer application
Object Recoginition using Legendre Moment Invariants for ROBOTIC Applications
-Dr. A. Venkataramana,S. M. Prasad
One of the important research areas in the field of robotics is the recognition of objects which are invariant under object plane transformations such as scale, translation and rotation. This paper presents object recognition system using Legendre moment invariants as features and back propagation neural network classifier for classification. Legendre moment invariants are selected for feature extraction of objects because they are orthogonal and are also invariant with respect to object plane transformations. Due to the invariant properties, the extracted features can be used to identify objects under different changes in scale, translation and rotation. The performance of back-propagation neural network is better than that of linear classifiers. Hence, back propagation neural network is used as classifier in the proposed approach. From the simulation results, it is observed that this approach provide better recognition rate.
Key Words: Object recognition, Legendre moments, Moment invariants, Feature extraction
Recognition of Handwritten Bangla Characters using Gabor Filter and Artificial Neural Network
-Halima Begum,Muhammed Mazharul Islam
Recognizing handwritten characters is a major challenge in the field of pattern recognition. High variability in the samples makes it difficult to obtain a unique solution. In this paper, Gabor filters were used to obtain directional features and to classify Bangla characters, artificial neural network (ANN) with back propagation learning algorithm was used. Using the directional feature, a higher rate of recognition of the character images was achieved.
Keywords: Bangla handwriting, pattern recognition, Gabor filter, artificial neural network
The User's Skill Capacity on Security for Mobile Computing in Universities
-Daniel Otanga,Frankin Wabwoba
Universities are shifting from partially computerized to fully automated environments and technology is equally shifting from point to point to broadcasting options. These trends are resulting in mobile computing for most university users with systems accumulating enormous amount of public, private as well as confidential data on employee, students and the institution. However, mobile computing systems normally come with security issues and different vulnerabilities that make users hesitate adopting them despite the many benefits they bring. The purpose of this paper was to establish the user skills capacity on security in mobile computing environment in universities. This part of the study was undertaken using survey design and scrutiny of literature review. Stratified random sampling and purposeful sampling was used to select respondents from six public and two private universities. The study found out the users skills capacity in the universities to be fairly moderate. The findings will help the university management determine the skills required in handling information on mobile computing in universities. The findings will also enhance the existing security approaches to mobile computing in universities and mitigate on the future trends in security for information systems.
Key words: Information System Security, Information Technology, Trends, Security Approaches, Threats, Vulnerability.
IJCTA © Copyrights 2015| All Rights Reserved.

This work is licensed under a Creative Commons Attribution 2.5 India License.