bookmarks  1

  • ⟨⟨
  • 1
  • ⟩⟩

publications  58  

  •  

    , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 475-485 (October 2018)1. Chalom, Edmond, Eran Asa, and Elior Biton. "Measuring image similarity: an overview of some useful applications." IEEE Instrumentation & Measurement Magazine 16.1 (2013): 24-28. 2. Chandler, Damon M. "Seven challenges in image quality assessment: past, present, and future research." ISRN Signal Processing 2013 (2013). 3. Chandler, Damon M., Md Mushfiqul Alam, and Thien D. Phan. "Seven challenges for image quality research." Human Vision and Electronic Imaging XIX. Vol. 9014. International Society for Optics and Photonics, 2014. 4. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Zernike moments for facial expression recognition." rn 2 (2009): 3. 5. Lajevardi, Seyed Mehdi, and Zahir M. Hussain. "Higher order orthogonal moments for invariant facial expression recognition." Digital Signal Processing 20.6 (2010): 1771-1779. 6. Pass, Greg, and Ramin Zabih. "Comparing images using joint histograms." Multimedia systems 7.3 (1999): 234-240. 7. Shnain, Noor Abdalrazak, Zahir M. Hussain, and Song Feng Lu. Ä feature-based structural measure: An image similarity measure for face recognition." Applied Sciences 7.8 (2017): 786. 8. Wang, Zhou, et al. "Image quality assessment: from error visibility to structural similarity." IEEE transactions on image processing 13.4 (2004): 600-612. 9. Zhang, Lin, et al. "FSIM: a feature similarity index for image quality assessment." IEEE transactions on Image Processing20.8 (2011): 2378-2386. 10. Aljanabi, Mohammed Abdulameer, Zahir M. Hussain, and Song Feng Lu. Än entropy-histogram approach for image similarity and face recognition." Mathematical Problems in Engineering 2018 (2018). 11. Aljanabi, Mohammed Abdulameer, Noor Abdalrazak Shnain, and Song Feng Lu. Än image similarity measure based on joint histogram—Entropy for face recognition." Computer and Communications (ICCC), 2017 3rd IEEE International Conference on. IEEE, 2017. 12. Hwang, Sun-Kyoo, and Whoi-Yul Kim. Ä novel approach to the fast computation of Zernike moments." Pattern Recognition 39.11 (2006): 2065-2076. 13. Canny, John. Ä computational approach to edge detection." IEEE Transactions on pattern analysis and machine intelligence 6 (1986): 679-698. 14. Picard, C. F. "The use of information theory in the study of the diversity of biological populations." Proc. Fifth Berk. Symp. IV. 1979. 15. Ponomarenko, Nikolay, et al. "TID2008-a database for evaluation of full-reference visual quality assessment metrics." Advances of Modern Radioelectronics 10.4 (2009): 30-45. 16. Ninassi, A., P. Le Callet, and F. Autrusseau. "Subjective quality assessment-IVC database." online http://www. irccyn. ec-nantes. fr/ivcdb (2006). 17. “Laboratories, A.T. The Database of Faces,” http://www.cl.cam.ac.uk/research/dtg/attarchive/facedatabase.html 18. “FEI Face Database,” http://fei.edu.br/∼cet/facedatabase.html.
    6 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 58-68 (July 2020)1. Adekola, O.G. (2013). New perspective to Nigeria’s foreign policy towards China, IOSR journal of humanities and social science, 6 (5), 01-06 2. Akeem, U.O. (2011), Performance evaluation of foreign trade and economic growth in nigeria, Journal of Finance and Accounting vol.2, No 2, 2222-2847 3. Alexandre Mercier, (2007).‘Commercial diplomacy in advanced industrial states’, Discussion Papers in Diplomacy, No. 108 (The Hague: Netherlands Institute of International Relations ‘Clingendael’, 4. Asongu, S. A., & Aminkeng, G. A. A., (2013). “The economic consequences of China-Africa relations: debunking myths in the debate”, Journal of Chinese Economic and Business Studies, 11(4), pp. 261-277. 5. Breinlich, H., Mion, G., Nolan, P. and D. Novy (2012), "Intellectual Property, Overseas Sales, and the Impact of UKTI Assistance in Entering New Overseas Markets", Report to UKTI. 6. Carmody, P., &Owusu, F., (2007). “Chinese vs. America geoeconomic strategies in Africa”,Political Geography, Political Geography, 26, pp. 504-524. 7. DayoAiyetan, (2010). “How China Fuels Deforestation In Nigeria, West Africa,” International Centre for Investigative Reporting (Nigeria), 8. Garten J., Zoellick R., Shinn J. (1998), Riding the Tigers: American Commercial Diplomacy in Asia, Columbia International Affairs online, Columbia University Press, 9. Harris R. and Li Q. (2005). Review of Literature: Review of the Literature: The Role of International Trade and Investment in Business Growth and Development, United Kingdom of Great Britain, Richard Harris & Q. Cher Li (copyright). 10. Helmers C., Rogers, M. and P. Schautschick (2011), “Intellectual Property at the Firm-Level in the UK”, Oxford University, Department of Economics Working Paper No. 546. 11. Kopp, Harry W., (2004), Commercial Diplomacy and the National Interest, Amercian Academy of Diplomacy/ Business Council for International Understanding 12. Kostecki M., Brossard H., Furrer O. Gramigna M. (1994) L’image des services suisses: Enjeux et proposition d’action, Die Unternehmung, Zurich, 1/94, 35-50. 13. Kotabe, M., and Czinkota, M. R. (1992). "State government promotion of manufacturing exports: A gap analysis", Journal of International Business Studies, 23(4), 637-658. 14. Maaike Okano-Heijmans(2010). ‘Hantering van het begrip economische diplomatie’, Internationale Spectator, Vol. 64, No. 5 pp. 73-74; Maaike Okano-Heijmans and Huub Ruel, ‘Commerciële diplomatie en internationaal ondernemen’, Internationale Spectator, Vol. 65, No. 9 (2011). 15. Michel Kostecki and Olivier Naray(2007). ‘Commercial diplomacy and international business’, Discussion Papers in Diplomacy, No. 107 (The Hague: Netherlands Institute of International Relations ‘Clingendael’, 16. Naray, O. (2008). Commercial Diplomacy: A Conceptual Overview." Conference paper for the 7th World Conference of TPOs – The Hague, The Netherlands. 17. Naray, O. (2010). What a good Commercial Diplomat has to know and be capable of",Exchange: The Magazine for International Business and Diplomacy, 2 (December 2010): 8-9. 18. Ogunkola, A. S. Bankole and A. Adewuyi,(2008), China-Nigeria economic relations: AERC scoping studies on China-Africa relations, a revised report submitted the Africa economic research consortium (AERC), University of Ibadan, Ibadan, Nigeria, 2008, 3-16 19. Reuvers, S. and Ruel, H. J. M., (2012)."Research on Commercial Diplomacy: Review and Implications" in Commercial Diplomacy and International Business: a conceptual and empirical exploration, Ruel, H. J. M., ed. (Advanced series in Management, Emerald, 20. Ruel, H. J. M. and Visser, R. (2012). Commercial Diplomats as corporate entrepreneurs: explaining role behavior from an institutional perspective", International Journal of Diplomacy and Economy. 21. Saner R. and Yiu L. (2003), International economic diplomacy: Mutations in post-modern times, Discussion Papers in Diplomacy,84, The Hague, Clingendael Institute. 22. Taylor, I., (2007). “Governance in Africa and Sino-Africa Relations: Contradictions or Confluence?”, Politics, 27(3), pp. 139-146. 23. Utomi, P. (2012). China and Nigeria, , retrieved from http://080603_utomi_nigeriachina, September 2013.
    4 years ago by @ijiris
     
     
  •  

    . International Journal of Innovative Research in Information Security, 7 (9): 99-104 (October 2020)1. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evolution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 2. Salem, A.M. Raushdy, M and HodHod, R.A., “ A rule based expert system for diagnosis of Heart disease”, 8th International conference on soft Computing MENDEL, Brno, Czech Republic, June 5-7, PP 258-263(2002). 3. Shaikh Abdul Hannan, V. D. Bhagile, R. R. Manza, R. J. Ramteke, "Development of an Expert System for Diagnosis and appropriate Medical Prescription of Heart Disease Using Support Vector Machine and Radial Basis Function", International Journal of Computer Science and Information Security, (IJCSIS) August issue (Vol. 8 No. 5), 2010, Pages/record No.: 245-254. ISSN: 19475500. 4. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis ofhe heart valve diseases”, Expert Systems with Applications vol.23,pp. 229–236, 2002. 5. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 6. Mrs. Bharati M. Ramageri, “Data Mining Techniques And Applications”,Bharati M. Ramageri / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 pp 301-305. 7. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 8. Rajeswari K, Vaithiyanathan V, P. Amirtharaj “Application of Decision Tree Classifiers in Diagnosing Heart Disease using Demographic Data” American Journal of Scientific research ISSN 2301-2005 pp. 77-82 EuroJournals Publishing, 2012. 9. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 10. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 11. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 12. Celikoglu HB. Application of radial basis function and eneralized regression neural networks in non-linear utility function specification for travel mode choice modelling. Math Comput Model 2006;44:640–58. 13. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 14. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Application (IJCA), New York, USA. 15. Kusuma.S1, Divya Udayan, “Machine Learning and Deep Learning Methods in Heart Disease (HD) Research, International Journal of Pure and Applied Mathematics, Volume 119 No. 18 2018, 1483-1496, ISSN: 1314-3395 (on-line version)url:http://www.acadpubl.eu/hub/Special Issue. 16. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 19. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 20. C.Sowmiya, Dr.P.Sumitra, “Analytical Study of Heart Disease Diagnosis Using Classification Techniques” 2017 IEEE International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, 978-1-5090-4778-9/17/$31.00 ©2017 IEEE. 21. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, K. V. Kale “Review on HRV based Prediction and Detection of Heart Disease” International Journal of Computer Application(IJCA), Vol. 179, Number 46, June 2018, ISSN 0975-8887, USA. 22. Rifki Wijaya, Ary Setijadi Prihatmanto,et.al “Preliminary Design of Estimation Heart disease by using machine learning ANN within one year” , 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Bandung-Bali, Indonesia, 978-1-4799-3365-5/13/$31.00 ©2013 IEEE. 23. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 24. Mahammed Waseem, Naushad Ahmed Osmani, Shaikh Abdul Hannan, “A Survey on E-education of information and Communication ‘Technology”, European Journal of Computer Science and Information Technology (EJCSIT), Vol. 4, Issue 6, ISSN 2054-0965, October 2016. 25. H. Uguz, A. Arslan, I. Turkoglu, Ä biomedical system based on hidden Markov model for diagnosis of the heart valve diseases", Pattern Recognition Letters vol.28 pp.395–404, (2007). 26. Mr.Deepak.C.Dhanwani,et.al.,"Survey on Various Techniques of Brain Tumor Detection from MRIImages", International Journal of Computational Engineering Research Vol, 04,Issue, 1,January-2014. 27. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 28. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 29. M. J. Baheti, A. V. Mane, Shaikh Abdul Hannan, K. V. Kale, “Comparison of PCA and SVM for a west Indian Script- Gujarati”, CiiT Journal of Digital Image Processing, Vol. 3. No. 11, pp. 709-715, July 2011. 30. Karaolis, M.A. Moutiris, J.A. Hadjipanayi, D. Pattichis, C.S., “Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees” IEEE Transactions on Information Technology in Biomedicine, pp 559 -566, May 2010. 31. Nikhil Gawande , Alka Barhatte , Heart Diseases Classification using Convolutional Neural Network, Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES), IEEE, 2017. 32. Mir Arif Ali, Shaikh Abdul Hannan, Ä Review on Modern and Classical Encryption Techniques", International Journal of Engineering Trends and Technology, Volume 12, Number 4, June 2014, ISSN 2231-5381, India. 33. Aufzalina Mohd Yusof, Nor Azura Md. Ghani, Khairul Asri Mohd Ghani, Khairul Izan Mohd Ghani, A predictive model for prediction of heart surgery procedure, Indonesian Journal of Electrical Engineering and Computer Science Vol. 15, No. 3, September 2019. 34. Amin Ul Haq, Jian Ping Li, Muhammad Hammad Memon, Shah Nazir, Ruinan Sun, A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms, Hindawi Mobile Information Systems Volume 2018. 35. X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264- 4271, 2014. 36. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 37. Y. Pei, S. Zhao, X. Yang, J. Cao and Y. Gong, “Design Optimization of a SRM Motor by a Nature-Inspired Algorithm: Multi-Verse Optimizer”, Proceedings of IEEE International Conference on Industrial Electronics and Applications, pp. 1870-1875, 2018. 38. Shaikh Abdul Hannan, V.D. Bhagile, R. R. Manza and R.J. Ramteke, “Expert System for Diagnosis and Appropriate Medical Prescription of Heart Disease Using Radial Basis Function”, CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol 2, No 8 (2010), pp 184-193, ISSN 0974–9667. 39. Durairaj M, Revathi V, “Prediction Of Heart Disease Using Back Propagation MLP Algorithm”, International Journal of Scientific and Technology Research, Volume 4, Issue 8, August 2015..
    a year ago by @ijiris
     
     
  •  

     
  •  

    . International Journal of Innovative Research in Information Security, 8 (3): 27-33 (August 2021)1. Abdulkadir Sengur, “An expert system based on linear Discriminant analysis and adaptive neuro-fuzzy inference system to diagnosis heart valve diseases”, ELSEVIER, Expert Systems with Applications 35, 214-222, 12 June 2007. 2. Jain Yu, “General C-Means Clustering Model”, IEEE Transactions On Pattern Analysis And Machine Intelugence, VOL. 27, NO. 8, August 2005. 3. Meyer-Baese, O. Lange, A. wismueller, and M. K. Hurdal, “Analysis of Dynamic Susceptibility constrast MRI Time Series Based on Unsupervised Clustering Methods”, IEEE Transactions on Information Technology in Biomedicine, VOL. 11, NO. 5, September 2007. 4. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 5. Fraser, H.S.F., et al., “Differential diagnoses of the heart disease program have better sensitivity than Resident Physicians”, Tufts-New England Medical Center, Boston, MA(2001). 6. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 7. Frawley and Piatetsky-Shapiro, 1996. Knowledge Discovery in Databases: An Overview. The AAAI/MIT Press, Menlo Park, C.A. 8. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 9. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis of the heart valve diseases”, Expert Systems with Applications vol.23, pp. 229–236, 2002. 10. I. Turkoglu, A. Arslan, E. Ilkay, “An intelligent system for diagnosis of heart valve diseases with wavelet packet neural networks”, Computer in Biology and Medicine vol.33 pp.319–331, 2003. 11. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 12. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 13. P.I.J. Keeton, F.S. Schlindwein, Application of Wavelets in Doppler Ultrasound, vol. 17, number 1, MCB University Press, 1997, pp. 38–45. 14. I.A. Wright, N.A.J. Gough, F. Rakebrandt, M. Wahab, J.P. Woodcock, Neural network analysis of Doppler ultrasound blood low signals: a pilot study, Ultrasound in Medicine & Biology 23 (5) (1997) 683–690. 15. I. Guler, M.K. Kiymik, S. Kara, M.E. Yuksel, Application of autoregressive analysis to 20 MHz pulsed Doppler data in real time, International Journal Biomedical Computing 31 (3–4) (1992) 247–256. 16. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. https://www.who.int/en/news-room/fact sheets/detail/cardiovascular-diseases-(cvds) https://www.mayoclinic.org/diseases-conditions/stroke/symptoms-causes/syc-20350113. 19. Shaikh Abdul Hannan, “An Overview of Big Data and Hadoop”, International Journal of Computer Application”, Volume 154, Number 10, ISSN – 0975-887, November 2016, New York, USA. 20. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Information SecApplicatiion (IJCA), New York, USA. 21. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 22. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 23. Yogesh Rajput, Shaikh Abdul Hannan, “Design New Wavelet Filter for Detection and Grading of Non-proliferative Diabetic Retinopathy Lesions”, International Conference on Recent Trends in Image Processing and Pattern Recognition, Jan 2020, Springer, Singpore. 24. Y. M. Rajput, A. H. Hannan, M. E. Alzahrani, R. R. Manza, D. D. Patil, “EEG-Based Emotion Recognition Using Different Neural Network and Pattern Recognition Techniques–A Review”, International Journal of Computer Sciences and Engineering, Vol 6, Issue 9, Sep 2018. 25. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 26. Eliane Rich and KevinKnight – Artificial Intelligence – Secone Edition Mcgraw Hill , 1983. 27. Long, W., et.al., “Developing a program for Tracking Heart Failure”, MIT Lab for Computer Science, Cambridge, MA(2001). 28. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evalution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 29. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 30. J. Galindo, P. Tamayo, Credit risk assessment using statistical and machine learning: basic methodology and risk modeling applications, Computational Economics 15 (1 – 2) (2000) 107–143 31. V. Vapnik, The Nature of Statistical Learning Theory, Springer- Verlag, New York, 1995. 32. M.A. Hearst, S.T. Dumais, E. Osman, J. Platt, B. Scho¨lkopf, Support vector machines, IEEE Intelligent Systems 13 (4) (1998) 18– 28. 33. Broomhead D., & Lowe, D., Multivariable functional interpolation and adaptive networks. Complex Systems, vol.2, pp.321-355, 1988. 34. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 35. Shaikh Abdul Hannan, Pravin Yannawar, R.R. Manza and R.J. Ramteke, “Expert System Data Collection Technique for Heart Disease” , in IT & Business Intelligence, on 06-08 Nov 2009, Organised By IMT, Nagpur, India. 36. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 37. Chauvin in, Y and D.E. Ruumehart Backpropagation : Theory, Architechtures and Applications, Erbaum Mahwah, NJ, ISBN : 080581258. PP 561, 1995. 38. Shaikh Abdul Hannan, V. D. Bhagile, R.R. Manza, R. J. Ramteke, “Heart Disease Diagnosis By Using FFBP algorithm of Artificial Neural Network”, International Conference on Communication, Computation, Control and Nanotechnology, ICN-2010 Organized by Rural Engineering College Bhalki-585328, during October 29-30, 2010. 39. Cigizoglu HK, Alp M. Generalized regression neural network in modelling river sediment yield. Adv Eng Software 2005;37:63–8. 40. Kim B, Lee DW, Parka KY, Choi SR, Choi S. Prediction of plasma etching using a randomized generalized regression neural network. Vacuum 2004;76:37–43 41. Jang JSR, Sun CT, Mizutani E. Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence, Prentice Hall, Upper Saddle River, New Jersey, USA; 1997 Chapter 9. 42. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 43. Anupriya Kamble, Abdul Hannan, Yogesh, Dnyaneshwari, “Association detection of Regular Insulin and NPH Insulin Using Statistical Features”, Second International Conference on Cognitive Knowledge Engineering, 21-23 December 2016 (ICKE-2016), Aurangabad, Maharashtra, India, pp 59-62, ISBN 978-93-80876-89-4. 44. Shaikh Abdul Hannan, Pravin Yannawar, R. R. Manza and R.J. Ramteke, “Data Mining Technique for Detection of Cardiac Problems Using Symptoms Medicine and Its Side effects”, in IT & Business Intelligence -09 , in IT & Business Intelligence, on 06-08 Nov 2009, Organized By IMT, Nagpur, India. 45. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 46. Ordonez C,” Association rule discovery with the train and test approach for heart disease prediction”, IEEE Transactions on Information Technology in Biomedicine, P(334 – 343), April 2006 47. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 48. AbuKhousa, E “Predictive data mining to support clinical decisions: An overview of heart disease prediction systems”, IEEE Transaction on Innovations in Information Technology (IIT), pp(267 - 272) March 2012..
    a year ago by @ijiris
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, Volume VII (Issue III): 25-35 (April 2020)1. Central Pollution Control Board (2019). E-Governance, viewed 01st December 2019. Available at: http://www.cpcb.nic.in/. 2. Down to Earth (2019).“Faith to Filth: Thanks to Kumbh, Prayagraj Sinks in Solid Waste.”, viewed 2nd December 2019. Available at: https://www.downtoearth.org.in/news/pollution/faith-to-filth-thanks-to-kumbh-prayagraj-sinks-in-solid-waste-64579. 3. Ganga River Monitoring Portal –UPPCB (2019).“Prayagraj Kumbh.” Viewed 5th December 2019. Available at: http://kumbh.upecp.in/. 4. Hindustan Times (2018). “Bathing in Ganga Can Expose People to High Levels of Faecal Coliform Bacteria.”, viewed 05th December 2019. Available at: https://www.hindustantimes.com/india-news/bathing-in-ganga-can-expose-people-to-high-levels-of-faecal-coliform-bacteria/story-UZlLeZk6eNGjI9OWh22L0H.html. 5. IANS (2019). “Prayagraj 'On Verge of Epidemic' as 2000 Tones of Kumbh Garbage Pile Up.” Viewed 15th December 2019. Available at: https://weather.com/en-IN/india/pollution/news/2019-05-21-prayagraj-kumbh-mela-garbage-pollution-health 6. Item No. 06 Court No. 1 PRINCIPAL BENCH, NEW DELHI NCR. , Viewed 15th December 2019. Available at: http://www.indiaenvironmentportal.org.in/files/file/Kumbh_Mela_industrial_pollution_NGT_Order_Ganga.pdf. 7. Milledge, David (2019). “Why over 350 Million People in the Ganges Catchment Live near Rivers Too Polluted for Bathing” viewed 5th December 2019. Available at: https://medium.com/@d.g.milledge/why-over-350-million-people-in-the-ganges-catchment-live-near-rivers-too-polluted-for-bathing-or-2eefd145087e. 8. National Mission for Clean Ganga, et al..” National Mission for Clean Ganga(NMCG),Ministry of Jal Shakti, Department of Water Resources, River Development & Ganga Rejuvenation, Government of India, https://nmcg.nic.in/. 9. SANDRP (2019). “DRP News Bulletin 18 March 2019: Citizens Act on Worsening Water Pollution.”, viewed 2nd December 2019. Available at: https://sandrp.in/2019/03/18/drp-news-bulleting-18-march-2019-citizens-act-on-worsening-water-pollution 10. Sanyal S, Madan A. (P2-39) Public Health Safety for Traditional MGs in India: A 10-Year Analysis. Prehosp Disaster Med. 2011;26(S1):s156. 11. Sharma, U., Desikachari, B. R., & Sarma, S. (2019). Protocol for development of a risk assessment tool for planning and management of religious mass-gathering events of India—a health system-strengthening initiative. Pilot and Feasibility Studies, 5(1). doi:10.1186/s40814-019-0464-z 12. Singh, S, and Anshika Bisht. “‘Environmental Management in Mass Gatherings: A Case Study of Maha Kumbh Mela 2013 at Prayag, India.’.” International Journal Of Innovative Research in Science & Technology, vol. 1, no. 7, 2014, pp. 107–115., http://www.ijirst.org/articles/IJIRSTV1I7017.pdf 13. The Financial Express (2019) “Kumbh Mela 2019: Pilgrims to Get Cleaner Ganga Water as UP Govt Orders Shutdown of Tanneries.” Viewed 1st December 2019. Available at: https://www.financialexpress.com/india-news/kumbh-mela-2019-pilgrims-to-get-cleaner-ganga-water-as-up-govt-orders-shutdown-of-tanneries/1421399/. 14. The Hindu Business Line (2019). Bureau, Our. “HIL's Charminar Installs Water Kiosks at Kumbh Mela 2019, viewed 15th December 2019. Available at: https://www.thehindubusinessline.com/news/hils-charminar-installs-water-kiosks-at-kumbh-mela-2019/article26139194.ece. 15. Vortmann, M., Balsari, S., Holman, S.R., & Greenough, P.G. (2015). Water, Sanitation, and Hygiene at the World’s Largest Mass Gathering. Current Infectious Disease Reports, 17, pp. 1-7. 16. World Health Organization (2015). “Guidelines for Drinking-Water Quality, Fourth Edition.” , viewed 01st December 2019 . Available at: https://www.who.int/water_sanitation_health/water-quality/guidelines/en/ 17. World Health Organization. Public health for MGs: key considerations. Geneva: WHO; 2015 18. WSSCC (2019) “WSSCC and GIWA Spread the Word on Sanitation and Water at Kumbh Mela.”, viewed 5th December 2019. Available at: https://www.wsscc.org/2019/01/25/wsscc-and-giwa-spread-the-word-on-sanitation-and-water-at-kumbha-mela/..
    4 years ago by @ijiris
     
     
  •  

    , , and . IRJCS:: International Research Journal of Computer Science, Volume VI (Issue III): 38-46 (March 2019)1. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, pp. 599-616, 2009. 2. P. Mell and T. Grance, "The NIST definition of cloud computing," 2011. 3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., Ä view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010. 4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., Äbove the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley2009. 5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008. GCE'08, 2008, pp. 1-10. 6. B. Hayes, "Cloud computing," Communications of the ACM, vol. 51, pp. 9-11, 2008. 7. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al., "The eucalyptus open-source cloud-computing system," in Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International Symposium on, 2009, pp. 124-131. 8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 23-50, 2011. 9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, Ä break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2008. 10. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, pp. 176-189, 2011. 11. A. D. Basha, I. N. Umar, and M. Abbas, "Mobile applications as cloud computing: implementation and challenge," International Journal of Information and Electronics Engineering, vol. 4, p. 36, 2014. 12. C. Shravanthi and H. Guruprasad, "Mobile cloud computing as future for mobile applications," International Journal of Research in Engineering and Technology, vol. 3, pp. 2319-2322, 2014. 13. N. Patil, N. Patil, A. Bagal, M. Desai, and A. Bhosale, "Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing." 14. A. D. Basha, "Modeling E-Learning Readiness among Instructors in Iraqi Public Universities," Universiti Sains Malaysia, 2015. 15. K. Patil and S. Patil, Ä CASE STUDY ON MOBILE CLOUD COMPUTING." 16. M. A. Mahmod, A. B. M. Ali, A. R. B. Ahlan, A. Shah, and M. S. A. Seman, "E-learning in Iraqi universities: A review," in Computing, Engineering, and Design (ICCED), 2017 International Conference on, 2017, pp. 1-4. 17. A. D. Basha, S. H. Mnaathr, I. N. Umar, and R. Jamaludin, "Insight on Protection of Universities Networks Information Security: The Problems and the Solutions," 2013. 18. E. M. Morgado and R. Schmidt, "Increasing Moodle resources through cloud computing," in Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, 2012, pp. 1-4. 19. M. Wang, Y. Chen, and M. J. Khan, "Mobile cloud learning for higher education: A case study of Moodle in the cloud," The International Review of Research in Open and Distributed Learning, vol. 15, 2014. 20. V. Siládi and V. Mižúrová, "LMS Moodle on Computing Cloud," in 4th Interantional Scientific Conference in V4 Countries, Applied Natural Sciences, Trnava, 2013. 21. V. Kumar and D. Sharma, "Creating Collaborative and Convenient Learning Environment Using Cloud-Based Moodle LMS: An Instructor and Administrator Perspective," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 11, pp. 35-50, 2016. 22. N. Sclater, "eLearning in the Cloud," International Journal of Virtual and Personal Learning Environments, vol. 1, pp. 10-19, 2012..
    5 years ago by @ijiris
     
     
  •  

     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 9 (2): 10-14 (May 2023)1. Adler, A.; Schuckers, S. Biometric vulnerabilities, overview. In Encyclopedia of Biometrics; Li, S.Z., Jain, A., Eds.; Springer: Boston, MA, USA, 2009. https://doi.org/10.1007/978-0-387-73003-5_65 2. Nguyen, H.T. Fingerprints Classification through Image Analysis and Machine Learning Method. Algorithms 2019, 12, 241. https://doi.org/10.3390/a12110241 3. Biometric Systems Lab—FVC2000: Fingerprint Verification Competition. Available online: FVC2000 (unibo.it)(accessed on 22 January 2021). 4. Tang, Y.; Gao, F.; Feng, J. Latent fingerprint minutia extraction using fully convolutional network. In Proceedings of the 2017 IEEE International Joint Conference on Biometrics, Denver, CO, USA, 1–4 October 2017; pp. 117–123. https://doi.org/10.1109/btas.2017.8272689 5. Huang, X.; Qian, P.; Liu, M. Latent fingerprint image enhancement based on progressive generative adversarial network. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA, 14–19 June 2020; pp. 3481–3489. https://doi.org/10.1109/cvprw50498.2020.00408 6. Neurotechnology Company—Sample Fingerprint Databases. Available online: Download biometric algorithm demo software, SDK trials, product brochures. (neurotechnology.com)(accessed on 22 January 2021). 7. Fingerprint Image identification for crime detection (2019) Fingerprint Image Identification for Crime Detection | IEEE Conference Publication | IEEE Xplore https://doi.org/10.1109/iccsp.2019.8698014.
    11 months ago by @ijiris
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue V): 108-116 (July 2019)1. UNAIDS. (2018). The Global HIV/AIDS Epidemic. Retrieved August 2018, from hiv.gov: https://www.hiv.gov/hiv-basics/overview/data-and-trends/global-statistics 2. Kimberly, G. (2015). HIV service delivery models towards `zero AIDS related deaths. BMC Health service research.15(2) 12-15 3. Johnson, K. (2013). integration of HIV and family planning Health services in Sub-saharan Africa, DHS Analytical studies no. 30 Calverton, Maryland, USA. 4. Mutemwa, R. (2016). Perception and Experiences of Integrated Service Delivery Among Women Living with HIV Attending Reproductive Health Services in Kenya: A Mixed Methods Study. AIDS and behaviour, 20(9), 2130-40. 5. Bergh, A. (2015). Clinician Perceptions and Patient Experiences of ART Teatment and primary health care integration in ART clinics. AOSIS open journa, 38(1),1489l. 6. Sima, Belachew, & Abebe. (2017). Knowledge, Attitude and Perceived Stigma towards Tuberculosis among Pastoralists. Plos one, 12(7), 18-32 7. Pathmanathan, Munyaradzi, Sherri, Dokubo, Preko, Mazibuko, et al. (2017). High Uptake of Antiretroviral Therapy among HIV-positive TB Patients Receiving co-located Services in Swaziland. plos one, 13(5). 196-831 8. Buh, W., Peter, N., & Atashili, J. (2016). Clients satisfaction with HIV treatment services in Bamenda, Cameroon. BMchC Health services Resear, 16(1), 280. 9. Kikuvi, J. (2014). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. International Aids Society. 10. Kioko, J. (2015). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. Journal Of International Aids Society, 16(1), 9-12. 11. National AIDS Control Council,NACC. (2016). Kenya HIV County Profiles. Nairobi: Ministry Of Health 12. Odeny. T, K. J. (2013). Intergration of HIV Core with Primary Health Care services:Effects of patient satisfaction and stigma in Rural Kenya. AIDS Resersch and Treatment, 20(2), 4-8..
    5 years ago by @ijiris
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 10 (01): 01-06 (April 2023)1. A.Sairohan, Dr.K.V.Ranga Rao, V.Sridhar “Smart gloves for real time applications,” vol. 11, pp. (2021). 2. Girish Gajanan Mulye “Advance Glove for Blind,” IJSR, vol. pp (2020). 3. Somashekar V, Manohar R, Ashwini M S, Praveen V, Sushmitha M “Smart glove for blind using TensorFlow,” IRJET, vol. 7, pp. (2020) 4. Arsh.A.Ghate, Vishal.G.Chavan “Smart gloves for blind,” IRJET, vol. 4, pp. (2017). 5. Hiranya Peiris, Charitha Kulasekara, HashanWijesinghe, Basiru Kothalawala, Namalie Walgampaya, Dharshana Kasthurirathna “Eye Vista: An assistive wearable device for visually impaired sprint athletes,” IEEE vol* pp.,(2016).
    12 months ago by @ijiris
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 9 (2): 15-20 (May 2023)1 D. Pavithra; Ranjith Balakrishnan, “IOT based monitoring and control system for home automation”, IEEE Explore, Communication Technologies (GCCT). https://doi.org/10.1109/gcct.2015.7342646 2 Dr. M. Suresh, A. Amulya, M. Hari Chandana, P. Amani, T. Lakshmi Prakasam. “Anti theft flooring system using raspberry pi using” in Compliance Engineering journal, vol 12, no. 7, pp. 306 – 317, 2021. 3 Sonali Das, Dr. Neelanarayan, “ IOT Based Anti Theft Flooring System” in IJESC , vol 10, no.4, pp. 25463-25466,2020. 4 Siddalingesha G.R, H. M. Shamita, “IOT Based Anti Theft System for home” in IRJET, vol 8, no. 10, pp. 509 – 513, 2021. 5 Sanjana Kute, Ruthvik Pimpalkar, Shivajirao S, “Theft Detection System” in IRE Journals, vol 4, no 10, 2456 – 2462, 2021. 6 Gaurav Sable, Gaurav Sharma, Manish Bhalerao, Yash Ramugade, “IOT Based Theft Detection using Raspberry Pi” in IJIRT, vol 11, no 12, 2356 – 2360, 2022. 7 Mohd Musab, Ms. Seema Kaloria, Ankit Chhipa, Anand Sharma, Fardeen Mansoori, “IOT Based Anti-Theft Security System” in IJRTI, vol 7, no 6, pp. 106 – 109, 2022. 8 Santosh Mahale, Shivam Gujrathi, Pratik Bramhecha, Kalyani Bedarkar, Rohini Shinde, Yashraj Patil, “Anti-Theft Detection System” in IJIRSET, vol 9, no 4, pp. 1889 – 1895, 2020. 9 Sharnil Pandya, Hemant Ghayvat, Ketan Kotecha, Mohammed Awais, Saeed Akbarzadeh, Prosanta Gope , Subhas Chandra Mukhopadhyay and Wei Chen, “Smart Home Anti-Theft System” in applied system innovation, vol 1, no 42, pp. 1-22, 2018 https://doi.org/10.3390/asi1040042 10 Mr. Vikrant A. Agaskar, “ IOT BASED IOT Based Theft Detection” in IJCRT, vol 6, no 2, pp. 231 – 234, 2018..
    11 months ago by @ijiris
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 77-101 (May 2019)1. Basavanthappa B. T. (2007). Nursing Research 2nd ed. Jaypee Brothers Medical Publishers Limited, New Delhi, India. 2. Bott S. & Carla M. (2013).The social and gender context of HIV disclosure in sub-Saharan Africa: A review of policies and practices, SAHARA J., 10 (1), 5–16 3. Chaudoir S. & Fisher J. (2010). The disclosure processes model: understanding disclosure decision-making and post-disclosure outcomes among people living with a concealable stigmatized identity, Psychological Bulletin., 136(2), 236–256. 4. Chilemba E. &Phiri C. (2015).Benefits and Risks of Disclosing Human Immunodeficiency Virus Diagnosis to Perinatally Infected Children: A Critical Review of the Literature, Journal Nursing Care 4(3)260-270. 5. Das A., Detels R., Javanbakht M., & Panda S.(2016).Issues around childhood disclosure of HIV status – findings from a qualitative study in West Bengal, India, Child Care Health Dev.; 42(4): 553–564. 6. GachanjaG.,& Burkholder J.(2016).A model for HIV disclosure of a parent's and/or a child's illness.PeerJ4(e1662) 7. Gachanja G., Burkholder J., & Ferraro A. (2014). HIV-Positive Parents’ accounts on disclosure preparation activities in Kenya. Journal of Social, Behavioral, and Health Sciences, 8(1), 18–37. 8. John-Stewart G., Wariua G., Beima-Sofie K., Richardson B., Farquhar C., Maleche-Obimbo E.,…&Wamalwa D. (2012).Prevalence, Perceptions and Correlates of Pediatric HIV Disclosure in an HIV Treatment Program in Kenya. AIDS care, 25(9), 1067–1076. doi: 10.1080/09540121.2012.749333 9. Kennedy D., Burton O., Laura M., Rosalie C., Gery W., Debra A., …& Mark A. (2014).Parents’ Disclosure of Their HIV Infection to Their Children in the Context of the Family. AIDs and behavior Journal, 14(5)1095–1105. 10. Kenya National Bureau of Statistics (KNBS) and ICF Macro. (2010). Kenya Demographic and Health Survey 2008-09. Calverton, Maryland: KNBS and ICF Macro. 11. Kidia K., Mupambireyi Z., Cluver L.,Ndhlovu C., Borok M. &Ferrand R. (2014). HIV Status Disclosure to Perinatally-Infected Adolescents in Zimbabwe: A Qualitative Study of Adolescent and Healthcare Worker Perspectives Published: January 27, 2014 DOI: 10.1371/journal.pone.0087322 12. Kitty G., Lazarus R., Strode A., Van Rooyen H.&Vujovic M. (2012). Legal, ethical and counselling issues related to HIV testing of children HIV counselling and testing of children: Implementation guidelines. 13. Kothari C. &Garg G. (2014). Research Methodology , methods and techniques 3rd ed. New Age International Limited Publishers, New Delhi. India. 14. Kyaddondo D., Wanyenze R., Kinsman J. &Hardon A. (2013).Disclosure of HIV status between parents and children in Uganda in the context of greater access to treatment. SAHARA J: Journal of Social Aspects of HIV/AIDS Research Alliance, 10 (1),37-45. 15. Madiba S. &Mokgatle M. (2015), Health care workers’ perspectives about disclosure to HIV-infected children; cross-sectional survey of health facilities in Gauteng and Mpumalanga provinces, South Africa. PeerJ 3(e893) 421- 432. 16. Mburu G., Hodgson I., Kalibala S., Haamujompa C., Cataldo F., Lowenthal E. &Ross D. (2014) Adolescent HIV disclosure in Zambia: barriers, facilitators and outcomes. Journal of the International AIDS Society17(1) 9-17. 17. Mugenda O. &Mugenda A. (2003). Research Methods – Qauntitative and Qualitative approaches. Acts Press Publisher, Nairobi. Kenya. 18. Murphy A. (2008). HIV-Positive Mothers' Disclosure of their Serostatus to their Young Children: A Review. Clin Child Psychol Psychiatry, 13(1), 105–122. 19. Mutumba M., Musiime V., Tsai A., Byaruhanga J., Kiweewa F., Bauermeister J. & Snow R. (2015) Disclosure of HIV Status to Perinatally Infected Adolescents in Urban Uganda: A Qualitative Study on Timing, Process, and Outcomes. Journal of the Association of Nurses in AIDS Care, 26(4), 472-484. 20. NACC, NASCOP, MoH (2014). Kenya HIV county profiles available at www.nacc.or.ke accessed on 5thMay 2016 at 1730hours. 21. Naeem-Sheik A. & Gray G. (2015) HIV disclosure in children. The South African Journal of HIV medicine, 2(1), 272-284. 22. National AIDS and STI Control Programme & Ministry of Public Health and Sanitation, Kenya (2008).Guidelines for HIV Testing and Counsellingi n Kenya. Nairobi: NASCOP. 23. National AIDS and STI Control Programme (NASCOP), Kenya (2012) Kenya AIDS Indicator Survey 2012: Final Report. Nairobi, NASCOP. 24. National AIDS and STI Control Programme (NASCOP), Kenya (2011) Guidelines for antiretroviral therapy in Kenya.4th ed. Nairobi, NASCOP. 25. National AIDS and STI Control Programme (NASCOP), Kenya (2014) Adolesence package of care in Kenya: A health care provider guide to adolescent care. Nairobi. NASCOP. 26. Nicastro E., Continisio G., Storace C., Bruzzese E., Mango C., Liguoro I., . . . & Officioso A. (2013). Family group psychotherapy to support the disclosure of HIV status to children and adolescents. AIDS PATIENT CARE and STDs, 27(6) 365 -369 27. Obermeyer C.,Baijal P. &Pegurri E. (2011).Facilitating HIV disclosure across diverse settings: A review. Am J Public Health, 101(6), 1011–1023. 28. Rispel C., Cloete A. & Metcalf C. (2015). We keep her status to ourselves’: Experiences of stigma and discrimination among HIV-discordant couples in South Africa, Tanzania and Ukraine SAHARA J, 12(1), 10–17. 29. UNAIDS Facts sheet 2014, retrieved from http://www.unaids.org/sites/default/files/en/media/unaids/contentassets/documents/factsheet/2014/20140716_FactSheet_en.pdf accessed at 1700hrs on10th November, 2015. 30. United Nations Children’s Fund, Towards an AIDS-Free Generation – Children and AIDS: Sixth Stocktaking Report, 2013, UNICEF, New York, 2013. 31. Vreeman R., Scanlon M.,Mwangi A.,Turissini M., Ayaya S., Tenge C. & Nyandiko W. (2014).A Cross-Sectional Study of Disclosure of HIV Status to Children and Adolescents in Western Kenya. PLoS One.9(1): e86616. Published online 2014 Jan 27. doi: 10.1371/journal.pone.0086616 PMCID: PMC3903588 32. Vreeman R., Gramelspacher A.,Gisore P., Scanlon M. &Nyandiko M. (2013). Disclosure of HIV status to children in resource-limited settings: a systematic review. Journal of the International AIDS Society.16, 18466 http://www.jiasociety.org/index.php/jias/article/view/18466 | http://dx.doi.org/10.7448/IAS.16.1.18466 33. World Health Organization (2011) Guideline on HIV Disclosure Counselling for Children up to 12 Years of Age. Geneva, Switzerland: World Health Organization. http://www.who.int/hiv/en/ accessed on 3rd February 2016 at 2100hours 34. Yamane Taro (1973). “Statistics: an introductory analysis.” New York: Harper & Row..
    5 years ago by @ijiris
     
     
  •  

     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue III): 38-42 (March 2019)1 Federal Agency on Technical Regulation and Metrology: Block ciphers (2015). http://www.tc26.ru/en/standard/draft/ENG_GOST_R_bsh.pdf. 2 Information technology. Cryptographic data security. Block ciphers operation modes. URL: http://www.tc26.ru/standard/ gost/GOST_R_ 3413-2015.pdf. 3 E. Biham, A. Shamir. Differential cryptanalysis of DES-like cryptosystems // Journal Cryptology. 1991. V. 4. P. 3–72. 4 R. AlTawy, A. Youssef, Meet in the Middle Attack on Reduced Round Kuznyechik, https://eprint.iacr.org/2015/ 096.pdf, pp. 9-12. 5 A. Biryukov, L. Perrin, A. Udovenko, Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1 (Full Version), https://eprint.iacr.org/ 2016/071.pdf, p. 3. 6 V. Dolmatov, GOST R 34.12-2015: Block Cipher "Kuznyechik. http://www.protocols.ru/WP/wp-content/ uploads/2016 /03/ rfc7801.pdf, pp. 3-4. 7 G.U. Juraev, A.A. Ikramov, A.R. Marakhimov, About differential cryptanalysis algorithm of block encryption Kuznyechik //International Journal of Advanced Research in Science, Engineering and Technology. Vol. 6, Issue 2, Feb 2019. –P. 8164-8169. http://www.ijarset.com/upload/2019/february/26-IJARSET-gjuraev.pdf..
    5 years ago by @ijiris
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 102-107 (May 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..
    5 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VIII): 76-80 (August 2020)1. Seenivasagam V, Velumani R, “A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud,” Computational and mathematical methods in medicine, 2013. 2. Parah S A , Sheikh J A , Ahad F , et al, “Information hiding in medical images: a robust medical image watermarking system for E-healthcare, “Multimedia Tools & Applications, vol. 76,no.8, pp.1-35.,2017 3. Aparna, Puvvadi , and P. V. V. Kishore , “Biometric-based efficient medical image watermarking in E-healthcare application,”IET Image Processing,vol .13,no.3 , pp.421-428,2019. 4. Aparna, Puvvadi , and P. V. V. Kishore , “An iris biometric-based dual encryption technique for medical image in e-healthcare application,” International Journal of Computational Vision and Robotics, vol.10,no.1,2020,:. 5. Raul R C, Claudia F U, Trinidad-Bias G J, “ Data Hiding Scheme for Medical Images,” Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on. IEEE, pp.32-32,2007. 6. Singh A K, Kumar B, Dave M, et al , “Robust and imperceptible dual watermarking for telemedicine applications,” Wireless Personal Communications, vol.80,no.4, pp.1415-1433,2015 7. Aparna, Puvvadi , and P. V. V. Kishore , “A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system,” Journal of Intelligent Systems ,2019. 8. Singh A K, Kumar B, Dave M, et al, “ Multiple watermarking on medical images using selective discrete wavelet transform coefficients,” Journal of Medical Imaging & Health Informatics, vol 5,no.3, pp.607-614,2015. 9. Ghouti, Lahouari , “ Robust perceptual color image hashing using randomized hypercomplex matrix factorizations,” Multimedia Tools and Applications ,vol77,no15,pp:19895-19929,2018 10. Cui, Yan , et al, “Supervised discrete discriminant hashing for image retrieval,” Pattern Recognition ,vol78,pp:79-90,2018.
    4 years ago by @ijiris
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue X): 99-103 (December 2020)1. Argyris, C., & Schon, D., (1978). Organizational Learning: A Theory of Action Perspective, Addison-Wesley, Reading, MA. 2. Argyris, C., Putman, R., and McLain Smith, D., (1985). Action Science, Concepts, Methods, and Skills for Research and Intervention, San Francisco, Jossey Bass 3. Bapuji, H., and Crossan, M. (2004). From Raising Questions to Providing Answers: Reviewing Organizational Learning Research, Management Learning, Vol. 35, No.4, PP. 397-417. 4. Bhattacherjee, A. (2012). Social Science Research: Principles, Methods, and Practices (2nd ed.). Textbooks Collection. Book 3. http://scholarcommons.usf.edu/oa_textbooks/3 5. C. Mausolff., (2004). Learning from feedback in performance measurement systems. Public Performance and Management Review, 28: 9-29 4. 6. C.M. Graham and F.M. Nafukho. (2007). Culture, organizational learning, and selected employee background variables in small size business enterprises. Journal of European Industrial Training, 31:127-144 6. 7. Chiva, R., Grandío, A., & Alegre, J., (2010). Adaptive and Generative Learning: Implications from Complexity Theories, International Journal of Management Reviews, Vol. 12, No. 2, PP. 114-129. 8. De Geus, A.p. (1988). Planning as learning Harvard Business Review,66(2),70-74. 9. Dimovski, V., (1994). Organizational Learning and Competitive Advantage, Ph.D. Thesis, Cleveland, Ohio 10. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm 11. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm. fifth edition (5th ed.). Edinburgh Gate, Harlow, Pearson Education Limited. 12. Finger, M., & Brand, S., (1999). The Concept of The Learning Organization, Applied To The Transformation of The Public Sector, In M. Easterby-Smith, L. Araujo and J. Burgoyne, Organizational Learning and The Learning Organization, London: Sage, P.2..
    3 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, 2017 (2): 14-27 (February 2017)
    7 years ago by @ijiris
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 69-75 (August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
    4 years ago by @ijiris