Notice Board :





Volume VIII Issue XII

Author Name
U Ismaila, B Feniouk, S Rezaeian
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 12
Abstract
In The previous few years, we've got seen several new and powerful steganography technique according in literature. Steganography is that the method of hiding one medium of communication (text, sound or image) inside another. a glance at the history beginning with historiographer in ancient Balkan country describing secret messages written in wax on stone tablets, to world war two’s secret double which means Nazi messages and British Intelligences invisible ink. Last the techniques are authorized with Osama Bin Laden's Al-Qaeda terrorist network. There are several techniques for activity messages in pictures in such a way that the alterations created to the image area unit perceptually indiscernible. However, the question whether or not they end in pictures that area unit statistically indistinguishable from unhampered pictures has not been adequately explored.
PaperID
2016/EUSRM/12/2016/42102

Author Name
S Rezaeian
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 12
Abstract
The in depth quantity of multimedia system info obtainable necessitates content-based video classification and retrieval ways. Since humans tend to use high-level linguistics ideas once querying and browsing multimedia system databases, there's an increasing would like for linguistics video classification and analysis. For this purpose, we have a tendency to present a unified framework for linguistics shot classification in sports video, which has been wide studied attributable to tremendous business potentials. in contrast to most existing approaches, that target cluster by aggregating shots or key-frames with similar low-level options, the projected scheme employs supervised learning to perform a top-down video shot classification. Moreover, the supervised learning procedure is made on the premise of effective mid-level representations rather than thorough low-level options.
PaperID
2016/EUSRM/12/2016/42179

Author Name
Rodrigo C, R Henkel
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 12
Abstract
Intelligent personal data management (IPKM) is application of AI in field of personal data management. With the event of the tutorial set up on the long learning, the request of community to the individual's data structure and data level area unit getting higher and higher. It became necessary to use intelligence to private data management that lands up in Intelligent Personal data Management. This paper researches on it. This report presents introduction of personal data management and necessary services and need of AI for effective and reliable operative of these services. These services embody search and question, classification, communication, conversion, cataloguing and browsing.
PaperID
2016/EUSRM/12/2016/42275

Author Name
Sarita, S Dubey
Year Of Publication
2016
Volume and Issue
Volume 8 Issue 12
Abstract
In network security various techniques have proposed to detect unauthorized use, misuse and abuse of computer systems by both system insiders and external intruders. Due to the rapidly increasing unauthorized activities In order to increase network security various technique has been proposed but having a deficiency over IDS system in some of the situation i.e. if correlation alarm is not precise, reduction and prevention of false positive and false negative is high , at last having insufficient measurement of pattern recognition. In order to overcome all these deficiency from IDS, system over network, we propose a novel dual detection of IDS based on supervised clustering that integrating the Game theory and K-means .The Game Theory helps for calculating reliability score and K-means resolves the problem of clustering and cluster head.
PaperID
2016/EUSRM/12/2016/42315