bookmarks  1

  • ⟨⟨
  • 1
  • ⟩⟩

publications  58  

  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 69-75 (August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
    4 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VIII): 76-80 (August 2020)1. Seenivasagam V, Velumani R, “A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud,” Computational and mathematical methods in medicine, 2013. 2. Parah S A , Sheikh J A , Ahad F , et al, “Information hiding in medical images: a robust medical image watermarking system for E-healthcare, “Multimedia Tools & Applications, vol. 76,no.8, pp.1-35.,2017 3. Aparna, Puvvadi , and P. V. V. Kishore , “Biometric-based efficient medical image watermarking in E-healthcare application,”IET Image Processing,vol .13,no.3 , pp.421-428,2019. 4. Aparna, Puvvadi , and P. V. V. Kishore , “An iris biometric-based dual encryption technique for medical image in e-healthcare application,” International Journal of Computational Vision and Robotics, vol.10,no.1,2020,:. 5. Raul R C, Claudia F U, Trinidad-Bias G J, “ Data Hiding Scheme for Medical Images,” Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on. IEEE, pp.32-32,2007. 6. Singh A K, Kumar B, Dave M, et al , “Robust and imperceptible dual watermarking for telemedicine applications,” Wireless Personal Communications, vol.80,no.4, pp.1415-1433,2015 7. Aparna, Puvvadi , and P. V. V. Kishore , “A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system,” Journal of Intelligent Systems ,2019. 8. Singh A K, Kumar B, Dave M, et al, “ Multiple watermarking on medical images using selective discrete wavelet transform coefficients,” Journal of Medical Imaging & Health Informatics, vol 5,no.3, pp.607-614,2015. 9. Ghouti, Lahouari , “ Robust perceptual color image hashing using randomized hypercomplex matrix factorizations,” Multimedia Tools and Applications ,vol77,no15,pp:19895-19929,2018 10. Cui, Yan , et al, “Supervised discrete discriminant hashing for image retrieval,” Pattern Recognition ,vol78,pp:79-90,2018.
    4 years ago by @ijiris
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IX): 465-470 (September 2018)1. Hussein T. Mouftah Khaled A. Ali, "Wireless personal area networks architecture and protocols for multimedia applications," Ad Hoc Networks, vol. 9, pp. 675–686, 2011. 2. Prashant Pillai, Vince W.C. Chook, Stefano Chessa, Alberto Gotta,Y. Fun Hu Paolo Baronti, "Wireless sensor networks: A survey on the state of the art and the 802.15.4 and ZigBee standards," Computer Communications, vol. 30, pp. 1655–1695, 2007. 3. ZigBee Alliance, ZigBee Specification, January.2008, ZigBee Document 053474r17. 4. Kamaran Javed , “ZigBee suitability for Wirelee Sensor Networks in Logistic Telemetry Applications”, School of information Science,Computer and Electrical Engineering, Jan 2006 5. Ricardo Augusto Rodrigues da Silva Severino, Ön the use of IEEE 802.15.4/ZigBee for Time-Sensitive Wireless Sensor Network Applications," Polytechnic Institute of Porto, 2008. 6. F. Cuomo et al., Cross-layer network formation for energy-efficient IEEE 802.15.4/ZigBee Wireless Sensor Networks, Ad Hoc Netw. (2011). 7. Standard for part 15.4: Wireless MAC and PHY specifications for low rate WPAN, IEEE Std 802.15.4, IEEE, New York, NY (Oct 2003). 8. Vijay Anand Sai Ponduru Archana Bharathidasan, "Sensor Networks: An Overview," Department of Computer Science, University of California, Davis, CA 95616,. 9. Nidhi Patel, Hiren Kathiriya , Arjav Bavarva , “Wireless Sensor Network using ZigBee “,Intenational Journal of Research in Engineering and Technology, Vol 2, Issue 6, Jun 2013 10. A. Geetha , “Intelligent Helmet for Coal Minors with voice over ZigBee and Environmental Monitoring” , Middle East Journal of Scentific Research , ISSN 1990-9233,IDOSI Publications 2014. 11. Action Nechibvute, Courage Mudzingw, “Wireless Sensor Networks for SCADA and Industrial Control Systems” , International Journal of Engineering and Technology , Vol 3 No. 12, Dec2013. 12. Hariprabha .V, Vasantharathna .S, “Monitoring and control of food storage depots using Wireless Sensor Network” , International Journal of Industrial Electronics and Electrical Engineering, ISSN 2437-6982,Vol 2 Issue 6 June 2014. 13. Dipali K Shende , Arun K Mane , Rahul K More , Nikel M Nawale , “ARM 7 based Wireless Data Transmission using ZigBee” , International Journal of Innovative research in Electrical, Electronics , Instrumentation and Control Engineering, Vol3 Issue 5, may 2015..
    6 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue I): 20-28 (January 2019)1. Khidir, M. and Ali, A. (2011).A Comparative Study of Authentication Methods for Wi-Fi Networks. In: Proceedings of International Conference on Computational Intelligence, Communication Systems and Networks Online, pp. 190-194. 2. Sheila, F., Bernard, E., Les, O., Karen, S.(2007). Establishing Wireless Robust security Networks: A Guide to IEEE 802.11i, NIST.US. 3. Kwang-Hyun, B., Sean, W. and David, K. (2004). A Survey of WPA and 802.11i RSN Authentication Protocols. Dartmouth College: Computer Science Technial Report TR2004-524. Available at: www.cs.dartmouth.edu/~dfk/papers/baek-survey-tr.pdf 4. Borisov,N. , Goldberg,I. and Wagner, D.(2001). Intercepting Mobile Communications: The Insecurity of 802.11. In: Proceedings of 7th Annual International Conference on Mobile Computing and Networking, Rome, Italy: ACM Press. 5. Yizhan, S. (2006). Complexity of System Configuration Management, PhD thesis, Tufts University..
    5 years ago by @ijiris
     
     
  •  

    . International Journal of Innovative Research in Information Security, 7 (9): 99-104 (October 2020)1. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evolution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 2. Salem, A.M. Raushdy, M and HodHod, R.A., “ A rule based expert system for diagnosis of Heart disease”, 8th International conference on soft Computing MENDEL, Brno, Czech Republic, June 5-7, PP 258-263(2002). 3. Shaikh Abdul Hannan, V. D. Bhagile, R. R. Manza, R. J. Ramteke, "Development of an Expert System for Diagnosis and appropriate Medical Prescription of Heart Disease Using Support Vector Machine and Radial Basis Function", International Journal of Computer Science and Information Security, (IJCSIS) August issue (Vol. 8 No. 5), 2010, Pages/record No.: 245-254. ISSN: 19475500. 4. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis ofhe heart valve diseases”, Expert Systems with Applications vol.23,pp. 229–236, 2002. 5. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 6. Mrs. Bharati M. Ramageri, “Data Mining Techniques And Applications”,Bharati M. Ramageri / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 pp 301-305. 7. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 8. Rajeswari K, Vaithiyanathan V, P. Amirtharaj “Application of Decision Tree Classifiers in Diagnosing Heart Disease using Demographic Data” American Journal of Scientific research ISSN 2301-2005 pp. 77-82 EuroJournals Publishing, 2012. 9. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 10. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 11. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 12. Celikoglu HB. Application of radial basis function and eneralized regression neural networks in non-linear utility function specification for travel mode choice modelling. Math Comput Model 2006;44:640–58. 13. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 14. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Application (IJCA), New York, USA. 15. Kusuma.S1, Divya Udayan, “Machine Learning and Deep Learning Methods in Heart Disease (HD) Research, International Journal of Pure and Applied Mathematics, Volume 119 No. 18 2018, 1483-1496, ISSN: 1314-3395 (on-line version)url:http://www.acadpubl.eu/hub/Special Issue. 16. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 19. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 20. C.Sowmiya, Dr.P.Sumitra, “Analytical Study of Heart Disease Diagnosis Using Classification Techniques” 2017 IEEE International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, 978-1-5090-4778-9/17/$31.00 ©2017 IEEE. 21. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, K. V. Kale “Review on HRV based Prediction and Detection of Heart Disease” International Journal of Computer Application(IJCA), Vol. 179, Number 46, June 2018, ISSN 0975-8887, USA. 22. Rifki Wijaya, Ary Setijadi Prihatmanto,et.al “Preliminary Design of Estimation Heart disease by using machine learning ANN within one year” , 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Bandung-Bali, Indonesia, 978-1-4799-3365-5/13/$31.00 ©2013 IEEE. 23. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 24. Mahammed Waseem, Naushad Ahmed Osmani, Shaikh Abdul Hannan, “A Survey on E-education of information and Communication ‘Technology”, European Journal of Computer Science and Information Technology (EJCSIT), Vol. 4, Issue 6, ISSN 2054-0965, October 2016. 25. H. Uguz, A. Arslan, I. Turkoglu, Ä biomedical system based on hidden Markov model for diagnosis of the heart valve diseases", Pattern Recognition Letters vol.28 pp.395–404, (2007). 26. Mr.Deepak.C.Dhanwani,et.al.,"Survey on Various Techniques of Brain Tumor Detection from MRIImages", International Journal of Computational Engineering Research Vol, 04,Issue, 1,January-2014. 27. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 28. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 29. M. J. Baheti, A. V. Mane, Shaikh Abdul Hannan, K. V. Kale, “Comparison of PCA and SVM for a west Indian Script- Gujarati”, CiiT Journal of Digital Image Processing, Vol. 3. No. 11, pp. 709-715, July 2011. 30. Karaolis, M.A. Moutiris, J.A. Hadjipanayi, D. Pattichis, C.S., “Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees” IEEE Transactions on Information Technology in Biomedicine, pp 559 -566, May 2010. 31. Nikhil Gawande , Alka Barhatte , Heart Diseases Classification using Convolutional Neural Network, Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES), IEEE, 2017. 32. Mir Arif Ali, Shaikh Abdul Hannan, Ä Review on Modern and Classical Encryption Techniques", International Journal of Engineering Trends and Technology, Volume 12, Number 4, June 2014, ISSN 2231-5381, India. 33. Aufzalina Mohd Yusof, Nor Azura Md. Ghani, Khairul Asri Mohd Ghani, Khairul Izan Mohd Ghani, A predictive model for prediction of heart surgery procedure, Indonesian Journal of Electrical Engineering and Computer Science Vol. 15, No. 3, September 2019. 34. Amin Ul Haq, Jian Ping Li, Muhammad Hammad Memon, Shah Nazir, Ruinan Sun, A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms, Hindawi Mobile Information Systems Volume 2018. 35. X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264- 4271, 2014. 36. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 37. Y. Pei, S. Zhao, X. Yang, J. Cao and Y. Gong, “Design Optimization of a SRM Motor by a Nature-Inspired Algorithm: Multi-Verse Optimizer”, Proceedings of IEEE International Conference on Industrial Electronics and Applications, pp. 1870-1875, 2018. 38. Shaikh Abdul Hannan, V.D. Bhagile, R. R. Manza and R.J. Ramteke, “Expert System for Diagnosis and Appropriate Medical Prescription of Heart Disease Using Radial Basis Function”, CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol 2, No 8 (2010), pp 184-193, ISSN 0974–9667. 39. Durairaj M, Revathi V, “Prediction Of Heart Disease Using Back Propagation MLP Algorithm”, International Journal of Scientific and Technology Research, Volume 4, Issue 8, August 2015..
    a year ago by @ijiris
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 102-107 (May 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..
    5 years ago by @ijiris
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 471-474 (September 2018)1. K. Wu and C. Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015 2. Shreyank N Gowda, “An Advanced Diffie-Hellman Approach to Image Steganography ” IEEE Transactions on advance network and telecommunication system Vol.19 pp 1-4,june 2016 3. Sherin Sugathan, “An Improved LSB Embedding Technique for Image Steganography ” International conference on applied and theoretical computing and communication technology Vol.33 pp 609-612,2016 4. S. Singh and V. K. Attri Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 , pp. 259-266 ,2015 5. Utsav Sheth and Shiva Saxena, “Image Steganography Using AES Encryption and Least Significant Nibble ” International conference on communication and signal processing Vol.11 pp 0876-0879,2016 6. Radu Pietraru, “Secure communication method based on encryption and steganography” International conference on control system and computer science Vol.31 pp 453-458,2017 7. Y Manjula and K B Shivakumar ,”Enhanced Secured Image Steganography using Double Encryption Algorithm” International Conference on Computing for Sustainable Global Development (IndiaCom),2016 8. Tanushree Shelare and Varsha Powar,”A secure transmission approach using B-Trees in steganography”International Conference on Automatic Control and Dynamic Optimization Techniques,2016 9. https://www.sans.org/reading-room/whitepapers/vpns/review-chaffing-winnowing-876 10. http://www.asp.net/: This is the official Microsoft ASP.NET web site. It has a lot of: tutorials, training videos, and sample projects. 11. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6850714&queryText%3Dimage+steganography 12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658020&queryText%3Dimage+steganography.
    6 years ago by @ijiris
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 28-38 (May 2023)1 M. Fernando and J. Wijayanayaka, "Low cost approach for real time sign language recognition," 2013 IEEE 8th International Conference on Industrial and Information Systems, 2013, pp. 637-642, https://doi.org/10.1109/iciinfs.2013.6732059 2 M. Z. Islam, M. S. Hossain, R. ul Islam and K. Andersson, "Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation," 2019 Joint 8th International Conference on Informatics, Electronics & Vision (ICIEV) and 2019 3rd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2019, pp. 324-329, https://doi.org/10.1109/iciev.2019.8858563 3 E. Kaya and T. Kumbasar, "Hand Gesture Recognition Systems with the Wearable Myo Armband," 2018 6th International Conference on Control Engineering & Information Technology (CEIT), 2018, pp. 1-6, https://doi.org/10.1109/ceit.2018.8751927 4 Lesha Bhansali and Meera Narvekar. Gesture Recognition to Make Umpire Decisions. International Journal of Computer Applications 148(14):26-29, August 2016. https://doi.org/10.5120/ijca2016911312 5 Suvarna Nandyal and Suvarna Laxmikant Kattimani 2021 J. Phys.: Conf. Ser. 2070 012148 6 Y. Madhuri, G. Anitha. and M. Anburajan., "Vision- based sign language translation device," 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 565-568, https://doi.org/10.1109/icices.2013.6508395 7 Nusirwan Anwar bin Abdul Rahman, Kit Chong Wei and John See Faculty of Information Technology, Multimedia University. 8 Moin, A., Zhou, A., Rahimi, A. et al. A wearable biosensing system with in-sensor adaptive machine learning for hand gesture recognition. Nat Electron 4, 54–63 (2021). https://doi.org/10.1038/s41928-020-00510-8 9 Ravi, H. Venugopal, S. Paul and H. R. Tizhoosh, Ä Dataset and Preliminary Results for Umpire Pose Detection Using SVM Classification of Deep Features," 2018 IEEE SymposiumSeries on Computational Intelligence (SSCI), 2018, pp. 1396-1402, https://doi.org/10.1109/ssci.2018.8628877 10 M. A. Shahjalal, Z. Ahmad, R. Rayan and L. Alam, Än approach to automate the scorecard in cricket with computer vision and machine learning," 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017, pp. 1-6, https://doi.org/10.1109/eict.2017.8275204.
    11 months ago by @ijiris
     
     
  •  

     
  •  

    . International Journal of Innovative Research in Information Security, 8 (3): 27-33 (August 2021)1. Abdulkadir Sengur, “An expert system based on linear Discriminant analysis and adaptive neuro-fuzzy inference system to diagnosis heart valve diseases”, ELSEVIER, Expert Systems with Applications 35, 214-222, 12 June 2007. 2. Jain Yu, “General C-Means Clustering Model”, IEEE Transactions On Pattern Analysis And Machine Intelugence, VOL. 27, NO. 8, August 2005. 3. Meyer-Baese, O. Lange, A. wismueller, and M. K. Hurdal, “Analysis of Dynamic Susceptibility constrast MRI Time Series Based on Unsupervised Clustering Methods”, IEEE Transactions on Information Technology in Biomedicine, VOL. 11, NO. 5, September 2007. 4. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 5. Fraser, H.S.F., et al., “Differential diagnoses of the heart disease program have better sensitivity than Resident Physicians”, Tufts-New England Medical Center, Boston, MA(2001). 6. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 7. Frawley and Piatetsky-Shapiro, 1996. Knowledge Discovery in Databases: An Overview. The AAAI/MIT Press, Menlo Park, C.A. 8. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 9. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis of the heart valve diseases”, Expert Systems with Applications vol.23, pp. 229–236, 2002. 10. I. Turkoglu, A. Arslan, E. Ilkay, “An intelligent system for diagnosis of heart valve diseases with wavelet packet neural networks”, Computer in Biology and Medicine vol.33 pp.319–331, 2003. 11. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 12. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 13. P.I.J. Keeton, F.S. Schlindwein, Application of Wavelets in Doppler Ultrasound, vol. 17, number 1, MCB University Press, 1997, pp. 38–45. 14. I.A. Wright, N.A.J. Gough, F. Rakebrandt, M. Wahab, J.P. Woodcock, Neural network analysis of Doppler ultrasound blood low signals: a pilot study, Ultrasound in Medicine & Biology 23 (5) (1997) 683–690. 15. I. Guler, M.K. Kiymik, S. Kara, M.E. Yuksel, Application of autoregressive analysis to 20 MHz pulsed Doppler data in real time, International Journal Biomedical Computing 31 (3–4) (1992) 247–256. 16. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. https://www.who.int/en/news-room/fact sheets/detail/cardiovascular-diseases-(cvds) https://www.mayoclinic.org/diseases-conditions/stroke/symptoms-causes/syc-20350113. 19. Shaikh Abdul Hannan, “An Overview of Big Data and Hadoop”, International Journal of Computer Application”, Volume 154, Number 10, ISSN – 0975-887, November 2016, New York, USA. 20. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Information SecApplicatiion (IJCA), New York, USA. 21. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 22. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 23. Yogesh Rajput, Shaikh Abdul Hannan, “Design New Wavelet Filter for Detection and Grading of Non-proliferative Diabetic Retinopathy Lesions”, International Conference on Recent Trends in Image Processing and Pattern Recognition, Jan 2020, Springer, Singpore. 24. Y. M. Rajput, A. H. Hannan, M. E. Alzahrani, R. R. Manza, D. D. Patil, “EEG-Based Emotion Recognition Using Different Neural Network and Pattern Recognition Techniques–A Review”, International Journal of Computer Sciences and Engineering, Vol 6, Issue 9, Sep 2018. 25. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 26. Eliane Rich and KevinKnight – Artificial Intelligence – Secone Edition Mcgraw Hill , 1983. 27. Long, W., et.al., “Developing a program for Tracking Heart Failure”, MIT Lab for Computer Science, Cambridge, MA(2001). 28. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evalution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 29. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 30. J. Galindo, P. Tamayo, Credit risk assessment using statistical and machine learning: basic methodology and risk modeling applications, Computational Economics 15 (1 – 2) (2000) 107–143 31. V. Vapnik, The Nature of Statistical Learning Theory, Springer- Verlag, New York, 1995. 32. M.A. Hearst, S.T. Dumais, E. Osman, J. Platt, B. Scho¨lkopf, Support vector machines, IEEE Intelligent Systems 13 (4) (1998) 18– 28. 33. Broomhead D., & Lowe, D., Multivariable functional interpolation and adaptive networks. Complex Systems, vol.2, pp.321-355, 1988. 34. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 35. Shaikh Abdul Hannan, Pravin Yannawar, R.R. Manza and R.J. Ramteke, “Expert System Data Collection Technique for Heart Disease” , in IT & Business Intelligence, on 06-08 Nov 2009, Organised By IMT, Nagpur, India. 36. Haralambos Sarimveis, Philip Doganis, Alex Alexandridis, “A classification technique based on radial basis function neural networks”, Advances in Engineering Software vol.37, pp.218–221, 2006. 37. Chauvin in, Y and D.E. Ruumehart Backpropagation : Theory, Architechtures and Applications, Erbaum Mahwah, NJ, ISBN : 080581258. PP 561, 1995. 38. Shaikh Abdul Hannan, V. D. Bhagile, R.R. Manza, R. J. Ramteke, “Heart Disease Diagnosis By Using FFBP algorithm of Artificial Neural Network”, International Conference on Communication, Computation, Control and Nanotechnology, ICN-2010 Organized by Rural Engineering College Bhalki-585328, during October 29-30, 2010. 39. Cigizoglu HK, Alp M. Generalized regression neural network in modelling river sediment yield. Adv Eng Software 2005;37:63–8. 40. Kim B, Lee DW, Parka KY, Choi SR, Choi S. Prediction of plasma etching using a randomized generalized regression neural network. Vacuum 2004;76:37–43 41. Jang JSR, Sun CT, Mizutani E. Neuro-fuzzy and soft computing: a computational approach to learning and machine intelligence, Prentice Hall, Upper Saddle River, New Jersey, USA; 1997 Chapter 9. 42. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 43. Anupriya Kamble, Abdul Hannan, Yogesh, Dnyaneshwari, “Association detection of Regular Insulin and NPH Insulin Using Statistical Features”, Second International Conference on Cognitive Knowledge Engineering, 21-23 December 2016 (ICKE-2016), Aurangabad, Maharashtra, India, pp 59-62, ISBN 978-93-80876-89-4. 44. Shaikh Abdul Hannan, Pravin Yannawar, R. R. Manza and R.J. Ramteke, “Data Mining Technique for Detection of Cardiac Problems Using Symptoms Medicine and Its Side effects”, in IT & Business Intelligence -09 , in IT & Business Intelligence, on 06-08 Nov 2009, Organized By IMT, Nagpur, India. 45. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 46. Ordonez C,” Association rule discovery with the train and test approach for heart disease prediction”, IEEE Transactions on Information Technology in Biomedicine, P(334 – 343), April 2006 47. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 48. AbuKhousa, E “Predictive data mining to support clinical decisions: An overview of heart disease prediction systems”, IEEE Transaction on Innovations in Information Technology (IIT), pp(267 - 272) March 2012..
    a year ago by @ijiris
     
     
  •  

    . International Journal of Innovative Research in Information Security, 09 (2): 50-54 (May 2023)1. Muhlenbach, F. and Rakotomalala, R. (2015), “Discretization of Continuous Attributes,” In: Wang, J., Ed., Encyclopedia of Data Warehousing and Mining, Idea Group Reference, 397-402. https://doi.org/10.4018/978-1-59140-557-3.ch076 2. M. Liu, D. Zhang, and D. Shen, “Relationship induced multi- 52 template learning for diagnosis of alzheimer’s disease and mild cognitive impairment,” IEEE transactions on medical imaging, vol. 35, no. 6, p. 1463—1474, (2016). https://doi.org/10.1109/tmi.2016.2515021 3. Abdullah Caliskan, Hasan Badem, A. Baştürk, M.E. Yüksel, “Diagnosis Of The Parkinson Disease By Using Deep Neural Network Classifier”, Journal Of Electrical And Electronics Engineering, (2017):3311-3318 4. M. Abdar and M. Zomorodi-Moghadam, “Impact of Patients’ Gender on Parkinson’s disease using Classification Algorithms” Journal of AI and Data Mining, vol. 6, (2018). 5. Sleigh, J.W.; Olofsen, E.; Dahan, A.; de Goede, J.; Steyn-Ross, A. Entropies of the EEG: The effects of general anaesthesia. In Proceedings of the 5th International Conference on Memory, Awareness and Consciousness, New York, NY, USA, 1–3 June (2019) 6. Tsuda, M., Asano, S., Kato, Y., Murai, K., and Miyazaki, M. (2020). Differential diagnosis of multiple system atrophy with predominant parkinsonism and Parkinson's disease using neural networks. J. Neurol. Sci. 401, 19–26. https://doi.org/10.1016/j.jns.2019.04.014 7. Tysnes, O.-B., and Storstein, A. (2021). Epidemiology of Parkinson's disease. J. Neural Trans. 124, 901–905. https://doi:10.1007/s00702-017-1686-y 8. Parkinson J. An Essay on the Shaking Palsy. London: Sherwood, Neely, and Jones; 1817. pp. 1–16. Google Scholar 9. Twelves D, Perkins KS, Counsell C. Systematic review of incidence studies of Parkinson’s disease. Mov Disord. 2003;18:19–31. PubMed Google Scholar 10. National Institute for Health and Care Excellence (NICE) Parkinson’s disease: diagnosis and management in primary and secondary care. NICE clinical guidelines 35. Jun, 2006. Available https://doi.org/10.1136/heartjnl-2022-321095 http://www.nice.org.uk/guidance/cg35/resources/guidance-parkinsons-disease-pdf. Accessed April 28, 2015. 11. Schrag A, Horsfall L, Walters K, et al. Prediagnostic presentations of Parkinson’s disease in primary care: a case-control study. Lancet Neurol. 2015; PubMed Google Scholar https://doi.org/10.1016/s1474-4422(14)70287-x 12. Parkinson’s Disease Foundation Statistics on Parkinson’s. Available at: www.pdf.org.en/parkinson_statistics Accessed June 19, 2014. 13. Driver JA, Logroscino G, Gaziano JM, et al. Incidence and remaining lifetime risk of Parkinson disease in advanced age. Neurology. 2009;72:32–38. PMC free article PubMed Google Scholar https://doi.org/10.1212/01.wnl.0000341769.50075.bb 14. De Lau LM, Breteler MM. Epidemiology of Parkinson’s disease. Lancet Neurol. 2006;5:525–535. PubMed Google Scholar 15. Miller IN, Cronin-Golomb A. Gender differences in Parkinson’s disease: clinical characteristics and cognition. Mov Disord. 2010;25:2695–2703. PMC free article PubMed Google Scholar https://doi.org/10.1002/mds.23388 16. Rumayor MA, Arrieta O, Sotelo J, et al. Female gender but not cigarette smoking delays the onset of Parkinson’s disease. Clin Neurol Neurosurg. 2009;PubMed Google Scholar https://doi.org/10.1016/j.clineuro.2009.07.012 17. Gómez-Esteban JC, Zarranz JJ, Lezcano E, et al. Influence of motor symptoms upon the quality of life of patients with Parkinson’s disease. Eur Neurol. 2007;57:161–165. PubMed Google Scholar https://doi.org/10.1159/000098468 18. Pennington S, Snell K, Lee M, et al. The cause of death in idiopathic Parkinson’s disease. Parkinsonism Relat Disord. 2010;16:434–437. PubMed Google Scholar https://doi.org/10.1016/j.parkreldis.2010.04.010 19. Jankovic J, Poewe W. Therapies in Parkinson’s disease. Curr Opin Neurol. 2012; PubMed Google Scholar 20. Smith Y, Wichmann T, Factor SA, DeLong MR. Parkinson’s disease therapeutics: new developments and challenges since the introduction of levodopa. Neuropsycho pharmacology. 2012;PMC free article PubMed Google Scholar https://doi.org/10.1038/npp.2011.212 21. Simonson W, Hauser RA, Schapira AHV. Role of the pharmacist in the effective management of wearing-off in Parkinson’s disease. Ann Pharmacother.2007; PubMed Google Scholar https://doi.org/10.1345/aph.1k348 22. Van der Marck MA, Bloem BR, Borm GF, et al. Effectiveness of multidisciplinary care for Parkinson’s disease: a randomized, controlled trial. Mov Disord. 2013;PubMed Google Scholar https://doi.org/10.1002/mds.25194 23. Zhou C, Huang Y, Przedborski S. Oxidative stress in Parkinson’s disease: a mechanism of pathogenic and therapeutic significance. Ann NY Acad Sci. 2008;1147:93–104. PMC free article PubMed Google Scholar https://doi.org/10.1196/annals.1427.023 24. Logroscino G. The role of early-life environmental risk factors in Parkinson disease: what is the evidence? Environ Health Perspect. 2005; PMC free article PubMed Google Scholar https://doi.org/10.1289/ehp.7573 25. Spatola M, Wider C. Genetics of Parkinson’s disease: the yield. Parkinsonism Relat Disord. 2014;20(suppl 1):S35–S38. PubMed Google Scholar https://doi.org/10.1016/s1353-8020(13)70011-7 26. Singleton AB, Farer MJ, Bonifati V. The genetics of Parkinson’s disease: progress and therapeutic implications. Mov Disord. 2013;28:14–23. PMC free article Pu bMed Google Scholar https://doi.org/10.1002/mds.25249 27. Santiago JA, Scherzer CR, Potashkin JA. Network analysis identifies SOD2 mRNA as a potential biomarker for Parkinson’s disease. PLoS One. 2014; PMC free article PubMed Google Scholar https://doi.org/10.1371/journal.pone.0109042 28. Liu R, Guo X, Park Y, et al. Caffeine intake, smoking, and risk of Parkinson disease in men and women. Am J Epidemiol. 2012; PMC free article PubMed Google Scholar https://doi.org/10.1093/aje/kwr451 29. Benmoyal-Segal L, Soreq H. Gene–environment interactions in sporadic Parkinson’s disease. J Neurochem. 2006;97:1740–1755. PubMed Google Scholar https://doi.org/10.1111/j.1471-4159.2006.03937.x 30. Van der Merwe C, Haylett W, Harvey J, et al. Factors influencing the development of early- or late-onset Parkinson’s disease in a cohort of South African patients. S Afr Med J. 2012;102:848–851. PubMed Google Scholar https://doi.org/10.7196/samj.5879 31. Wang G, Pan J, Chen SD. Kinases and kinase signaling pathways: potential therapeutic targets in Parkinson’s disease. Prog Neurobiol. 2012; PubMed Google Scholar https://doi.org/10.1016/j.pneurobio.2012.06.003 32. Gilgun-Sherki Y, Djaldetti R, Melamed E, Offen D. Polymorphism in candidate genes: implications for the risk and treatment of idiopathic Parkinson’s disease. Pharmacogenomics J. 2004;4:291–306. PubMed Google Scholar https://doi.org/10.1038/sj.tpj.6500260 33. Agúndez JA, García-Martín E, Alonso-Navarro H, et al. Anti-Parkinson’s disease drugs and pharmacogenetic considerations. Expert Opin Drug Metab Toxicol. 2013;9:859–874. PubMed Google Scholar https://doi.org/10.1517/17425255.2013.789018 34. Marras C, Goldman SM. Genetics meets environment: evaluating gene–environment interactions in neurologic diseases. Semin Neurol. 2011;31:553–561. PubMed Google Scholar https://doi.org/10.1055/s-0031-1299793 35. Soreq L, Ben-Shaul Y, Israel Z, et al. Meta-analysis of genetic and environmental Parkinson’s disease models reveals a common role of mitochondrial protection pathways. Neurobiol Dis. 2012;45:1018–1030. PubMed Google Scholar https://doi.org/10.1016/j.nbd.2011.12.021 36. Curtin K, Fleckenstein AE, Robison RJ, et al. Methamphetamine/amphetamine abuse and risk of Parkinson’s disease in Utah: a population-based assessment. Drug Alcohol Depend. 2015;146:30–38. PMC free article PubMed Google Scholar https://doi.org/10.1016/j.drugalcdep.2014.10.027 37. Chen JJ, Swope DM. Parkinson’s disease. In: DiPiro JT, Talbert RL, Yee GC, et al., editors. Pharmacotherapy: A Pathophysiologic Approach. 9th ed. New York, New York: McGraw-Hill; 2014. Google Scholar 38. Chade AR, Kasten M, Tanner CM. Nongenetic causes of Parkinson’s disease. J Neural Transm Suppl. 2006;70:147–151. PubMed Google Scholar https://doi.org/10.1007/978-3-211-45295-0_23.
    11 months ago by @ijiris
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 9 (2): 15-20 (May 2023)1 D. Pavithra; Ranjith Balakrishnan, “IOT based monitoring and control system for home automation”, IEEE Explore, Communication Technologies (GCCT). https://doi.org/10.1109/gcct.2015.7342646 2 Dr. M. Suresh, A. Amulya, M. Hari Chandana, P. Amani, T. Lakshmi Prakasam. “Anti theft flooring system using raspberry pi using” in Compliance Engineering journal, vol 12, no. 7, pp. 306 – 317, 2021. 3 Sonali Das, Dr. Neelanarayan, “ IOT Based Anti Theft Flooring System” in IJESC , vol 10, no.4, pp. 25463-25466,2020. 4 Siddalingesha G.R, H. M. Shamita, “IOT Based Anti Theft System for home” in IRJET, vol 8, no. 10, pp. 509 – 513, 2021. 5 Sanjana Kute, Ruthvik Pimpalkar, Shivajirao S, “Theft Detection System” in IRE Journals, vol 4, no 10, 2456 – 2462, 2021. 6 Gaurav Sable, Gaurav Sharma, Manish Bhalerao, Yash Ramugade, “IOT Based Theft Detection using Raspberry Pi” in IJIRT, vol 11, no 12, 2356 – 2360, 2022. 7 Mohd Musab, Ms. Seema Kaloria, Ankit Chhipa, Anand Sharma, Fardeen Mansoori, “IOT Based Anti-Theft Security System” in IJRTI, vol 7, no 6, pp. 106 – 109, 2022. 8 Santosh Mahale, Shivam Gujrathi, Pratik Bramhecha, Kalyani Bedarkar, Rohini Shinde, Yashraj Patil, “Anti-Theft Detection System” in IJIRSET, vol 9, no 4, pp. 1889 – 1895, 2020. 9 Sharnil Pandya, Hemant Ghayvat, Ketan Kotecha, Mohammed Awais, Saeed Akbarzadeh, Prosanta Gope , Subhas Chandra Mukhopadhyay and Wei Chen, “Smart Home Anti-Theft System” in applied system innovation, vol 1, no 42, pp. 1-22, 2018 https://doi.org/10.3390/asi1040042 10 Mr. Vikrant A. Agaskar, “ IOT BASED IOT Based Theft Detection” in IJCRT, vol 6, no 2, pp. 231 – 234, 2018..
    11 months ago by @ijiris
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 77-101 (May 2019)1. Basavanthappa B. T. (2007). Nursing Research 2nd ed. Jaypee Brothers Medical Publishers Limited, New Delhi, India. 2. Bott S. & Carla M. (2013).The social and gender context of HIV disclosure in sub-Saharan Africa: A review of policies and practices, SAHARA J., 10 (1), 5–16 3. Chaudoir S. & Fisher J. (2010). The disclosure processes model: understanding disclosure decision-making and post-disclosure outcomes among people living with a concealable stigmatized identity, Psychological Bulletin., 136(2), 236–256. 4. Chilemba E. &Phiri C. (2015).Benefits and Risks of Disclosing Human Immunodeficiency Virus Diagnosis to Perinatally Infected Children: A Critical Review of the Literature, Journal Nursing Care 4(3)260-270. 5. Das A., Detels R., Javanbakht M., & Panda S.(2016).Issues around childhood disclosure of HIV status – findings from a qualitative study in West Bengal, India, Child Care Health Dev.; 42(4): 553–564. 6. GachanjaG.,& Burkholder J.(2016).A model for HIV disclosure of a parent's and/or a child's illness.PeerJ4(e1662) 7. Gachanja G., Burkholder J., & Ferraro A. (2014). HIV-Positive Parents’ accounts on disclosure preparation activities in Kenya. Journal of Social, Behavioral, and Health Sciences, 8(1), 18–37. 8. John-Stewart G., Wariua G., Beima-Sofie K., Richardson B., Farquhar C., Maleche-Obimbo E.,…&Wamalwa D. (2012).Prevalence, Perceptions and Correlates of Pediatric HIV Disclosure in an HIV Treatment Program in Kenya. AIDS care, 25(9), 1067–1076. doi: 10.1080/09540121.2012.749333 9. Kennedy D., Burton O., Laura M., Rosalie C., Gery W., Debra A., …& Mark A. (2014).Parents’ Disclosure of Their HIV Infection to Their Children in the Context of the Family. AIDs and behavior Journal, 14(5)1095–1105. 10. Kenya National Bureau of Statistics (KNBS) and ICF Macro. (2010). Kenya Demographic and Health Survey 2008-09. Calverton, Maryland: KNBS and ICF Macro. 11. Kidia K., Mupambireyi Z., Cluver L.,Ndhlovu C., Borok M. &Ferrand R. (2014). HIV Status Disclosure to Perinatally-Infected Adolescents in Zimbabwe: A Qualitative Study of Adolescent and Healthcare Worker Perspectives Published: January 27, 2014 DOI: 10.1371/journal.pone.0087322 12. Kitty G., Lazarus R., Strode A., Van Rooyen H.&Vujovic M. (2012). Legal, ethical and counselling issues related to HIV testing of children HIV counselling and testing of children: Implementation guidelines. 13. Kothari C. &Garg G. (2014). Research Methodology , methods and techniques 3rd ed. New Age International Limited Publishers, New Delhi. India. 14. Kyaddondo D., Wanyenze R., Kinsman J. &Hardon A. (2013).Disclosure of HIV status between parents and children in Uganda in the context of greater access to treatment. SAHARA J: Journal of Social Aspects of HIV/AIDS Research Alliance, 10 (1),37-45. 15. Madiba S. &Mokgatle M. (2015), Health care workers’ perspectives about disclosure to HIV-infected children; cross-sectional survey of health facilities in Gauteng and Mpumalanga provinces, South Africa. PeerJ 3(e893) 421- 432. 16. Mburu G., Hodgson I., Kalibala S., Haamujompa C., Cataldo F., Lowenthal E. &Ross D. (2014) Adolescent HIV disclosure in Zambia: barriers, facilitators and outcomes. Journal of the International AIDS Society17(1) 9-17. 17. Mugenda O. &Mugenda A. (2003). Research Methods – Qauntitative and Qualitative approaches. Acts Press Publisher, Nairobi. Kenya. 18. Murphy A. (2008). HIV-Positive Mothers' Disclosure of their Serostatus to their Young Children: A Review. Clin Child Psychol Psychiatry, 13(1), 105–122. 19. Mutumba M., Musiime V., Tsai A., Byaruhanga J., Kiweewa F., Bauermeister J. & Snow R. (2015) Disclosure of HIV Status to Perinatally Infected Adolescents in Urban Uganda: A Qualitative Study on Timing, Process, and Outcomes. Journal of the Association of Nurses in AIDS Care, 26(4), 472-484. 20. NACC, NASCOP, MoH (2014). Kenya HIV county profiles available at www.nacc.or.ke accessed on 5thMay 2016 at 1730hours. 21. Naeem-Sheik A. & Gray G. (2015) HIV disclosure in children. The South African Journal of HIV medicine, 2(1), 272-284. 22. National AIDS and STI Control Programme & Ministry of Public Health and Sanitation, Kenya (2008).Guidelines for HIV Testing and Counsellingi n Kenya. Nairobi: NASCOP. 23. National AIDS and STI Control Programme (NASCOP), Kenya (2012) Kenya AIDS Indicator Survey 2012: Final Report. Nairobi, NASCOP. 24. National AIDS and STI Control Programme (NASCOP), Kenya (2011) Guidelines for antiretroviral therapy in Kenya.4th ed. Nairobi, NASCOP. 25. National AIDS and STI Control Programme (NASCOP), Kenya (2014) Adolesence package of care in Kenya: A health care provider guide to adolescent care. Nairobi. NASCOP. 26. Nicastro E., Continisio G., Storace C., Bruzzese E., Mango C., Liguoro I., . . . & Officioso A. (2013). Family group psychotherapy to support the disclosure of HIV status to children and adolescents. AIDS PATIENT CARE and STDs, 27(6) 365 -369 27. Obermeyer C.,Baijal P. &Pegurri E. (2011).Facilitating HIV disclosure across diverse settings: A review. Am J Public Health, 101(6), 1011–1023. 28. Rispel C., Cloete A. & Metcalf C. (2015). We keep her status to ourselves’: Experiences of stigma and discrimination among HIV-discordant couples in South Africa, Tanzania and Ukraine SAHARA J, 12(1), 10–17. 29. UNAIDS Facts sheet 2014, retrieved from http://www.unaids.org/sites/default/files/en/media/unaids/contentassets/documents/factsheet/2014/20140716_FactSheet_en.pdf accessed at 1700hrs on10th November, 2015. 30. United Nations Children’s Fund, Towards an AIDS-Free Generation – Children and AIDS: Sixth Stocktaking Report, 2013, UNICEF, New York, 2013. 31. Vreeman R., Scanlon M.,Mwangi A.,Turissini M., Ayaya S., Tenge C. & Nyandiko W. (2014).A Cross-Sectional Study of Disclosure of HIV Status to Children and Adolescents in Western Kenya. PLoS One.9(1): e86616. Published online 2014 Jan 27. doi: 10.1371/journal.pone.0086616 PMCID: PMC3903588 32. Vreeman R., Gramelspacher A.,Gisore P., Scanlon M. &Nyandiko M. (2013). Disclosure of HIV status to children in resource-limited settings: a systematic review. Journal of the International AIDS Society.16, 18466 http://www.jiasociety.org/index.php/jias/article/view/18466 | http://dx.doi.org/10.7448/IAS.16.1.18466 33. World Health Organization (2011) Guideline on HIV Disclosure Counselling for Children up to 12 Years of Age. Geneva, Switzerland: World Health Organization. http://www.who.int/hiv/en/ accessed on 3rd February 2016 at 2100hours 34. Yamane Taro (1973). “Statistics: an introductory analysis.” New York: Harper & Row..
    5 years ago by @ijiris
     
     
  •  

    . International Journal of Innovative Research in Information Security, Volume IV (Issue IV): 36-40 (April 2020)1. https://cleartax.in/s/insurance 2. https://www.scribd.com/doc/10487143/Project-On-The-New-India-Assurance-Com-By-Sandeep-vaishnav 3. https://trendlyne.com/research-reports/stock/65182/NIACL/the-new-india-assurance-company-ltd/.
    4 years ago by @ijiris
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, VIII (II): 06-09 (July 2021)1. Door Unlock using Face Recognition (Abdul Azeem, Sathuluri Mallikarjun Rao,Kandula Rama Rao, Shaik Akbar Basha, Harsha Pedarla, Modela Gopi) 2. Facial Recognition Enabled Smart Door Using Microsoft Face API (Karan Maheshwari , Nalini N) 3 Automated door access control system using face recognition (Tejas Saraf, Ketan Shukla, Harish Balkhande, Ajinkya Deshmukh) 3. Facial recognition enabled smart door unlock system(M Vamsi Krishna, A Bhargav Reddy, V Sandeep) 4. Smart Door with Face UnlockApache2.0 (https://create.arduino.cc) (Divins Mathew) 5. Makers Pro Projects(Simple Door Lock Using Face recognition Solenoid Lock)(Muhammad Aqib).
    3 years ago by @ijiris
     
     
  •  

    , and . IRJCS:: International Research Journal of Computer Science, Volume IV (Issue XII): 01-06 (December 2017)1. S. Berchtold, C Bohm, and H. Kriegel. The Pyramid-Technique: Towards Breaking the Curse of Dimensionality. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data, pages 142–153, Seattle, Washington, 2010, 98. 185 2. Stefan Berchtold, Daniel A. Keim, and Hans-Peter Kriegel. The SR-tree : An index structure for high-dimensional data. In Proceedings of 22th International Conference on Very Large Data Bases, VLDB’12, pages 28–39, Bombay, India, 2012. 3. N. Beckmann, H.P. Kriegel, R. Schneider, and B. Seeger. The SR-tree: an Efficient and Robust Access Method for Points and Rectangles. In Proceedings of ACM-SIGMOD International Conference on Management of Data, pages 322–331, Atlantic City, NJ, May 2011. 4. K. Chakrabarti and S. Mehrotra. The Hybrid Tree: An Index Structure for High Dimensional Feature Spaces. In Proceedings of the 16th International Conference on Data Engineering, pages 440–447, San Diego, CA, February 2012. 5. Sudipto Guha, Rajeev Rastogi, and Kyuseok Shim. Cure: An efficient clustering algorithm for large databases. In Proceedings of the ACM SIGMOD conference on Management of Data, pages 73–84, Seattle, WA, 2011. 6. R. Kurniawati, J. S. Jin, and J. A. Shepherd. The SS+-tree: An improved index structure for similarity searches in a high-dimensional feature space. In Proceedings of SPIE Storage and Retrieval for Image and Video Databases, pages 13–24, February 2012. 7. N. Katayama and S. Satoh. The SR-tree: An Index Structure for High-Dimensional Nearest Neighbor Queries. In Proceedings of the 2013 ACM SIGMOD International Conference on Management of Data, pages 369–380, Tucson, Arizona, 2013. 8. J.T. Robinson. The K-D-B-Tree: A Search Structure for Large Multidimensional Dynamic Indexes. In Proceedings of the ACM SIGMOD Conference on Management of Data, pages 10–18, Ann Arbor, MI, April 2013. 9. D.A. White and R. Jain. Similarity Indexing with the SS-tree. In Proceedings of the 12th Intl. Conf. on Data Engineering, pages 516–523, New Orleans, Louisiana, February 2014. 10. D. Yu, S. Chatterjee, G. Sheikholeslami, and A. Zhang. Efficiently detecting arbitrary shaped clusters in very large datasets with high dimensions. Technical Report 98-8, State University of New York at Buffalo, Department of Computer Science and Engineering, November 2013. 11. Tian Zhang, Raghu Ramakrishnan, and Miron Livny. BIRCH: An Efficient Data Clustering Method for Very Large Databases. In Proceedings of the 2012 ACM SIGMOD International Conference on Management of Data, pages 103–114, Montreal, Canada, 2012..
    6 years ago by @ijiris
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, Volume VII (Issue III): 25-35 (April 2020)1. Central Pollution Control Board (2019). E-Governance, viewed 01st December 2019. Available at: http://www.cpcb.nic.in/. 2. Down to Earth (2019).“Faith to Filth: Thanks to Kumbh, Prayagraj Sinks in Solid Waste.”, viewed 2nd December 2019. Available at: https://www.downtoearth.org.in/news/pollution/faith-to-filth-thanks-to-kumbh-prayagraj-sinks-in-solid-waste-64579. 3. Ganga River Monitoring Portal –UPPCB (2019).“Prayagraj Kumbh.” Viewed 5th December 2019. Available at: http://kumbh.upecp.in/. 4. Hindustan Times (2018). “Bathing in Ganga Can Expose People to High Levels of Faecal Coliform Bacteria.”, viewed 05th December 2019. Available at: https://www.hindustantimes.com/india-news/bathing-in-ganga-can-expose-people-to-high-levels-of-faecal-coliform-bacteria/story-UZlLeZk6eNGjI9OWh22L0H.html. 5. IANS (2019). “Prayagraj 'On Verge of Epidemic' as 2000 Tones of Kumbh Garbage Pile Up.” Viewed 15th December 2019. Available at: https://weather.com/en-IN/india/pollution/news/2019-05-21-prayagraj-kumbh-mela-garbage-pollution-health 6. Item No. 06 Court No. 1 PRINCIPAL BENCH, NEW DELHI NCR. , Viewed 15th December 2019. Available at: http://www.indiaenvironmentportal.org.in/files/file/Kumbh_Mela_industrial_pollution_NGT_Order_Ganga.pdf. 7. Milledge, David (2019). “Why over 350 Million People in the Ganges Catchment Live near Rivers Too Polluted for Bathing” viewed 5th December 2019. Available at: https://medium.com/@d.g.milledge/why-over-350-million-people-in-the-ganges-catchment-live-near-rivers-too-polluted-for-bathing-or-2eefd145087e. 8. National Mission for Clean Ganga, et al..” National Mission for Clean Ganga(NMCG),Ministry of Jal Shakti, Department of Water Resources, River Development & Ganga Rejuvenation, Government of India, https://nmcg.nic.in/. 9. SANDRP (2019). “DRP News Bulletin 18 March 2019: Citizens Act on Worsening Water Pollution.”, viewed 2nd December 2019. Available at: https://sandrp.in/2019/03/18/drp-news-bulleting-18-march-2019-citizens-act-on-worsening-water-pollution 10. Sanyal S, Madan A. (P2-39) Public Health Safety for Traditional MGs in India: A 10-Year Analysis. Prehosp Disaster Med. 2011;26(S1):s156. 11. Sharma, U., Desikachari, B. R., & Sarma, S. (2019). Protocol for development of a risk assessment tool for planning and management of religious mass-gathering events of India—a health system-strengthening initiative. Pilot and Feasibility Studies, 5(1). doi:10.1186/s40814-019-0464-z 12. Singh, S, and Anshika Bisht. “‘Environmental Management in Mass Gatherings: A Case Study of Maha Kumbh Mela 2013 at Prayag, India.’.” International Journal Of Innovative Research in Science & Technology, vol. 1, no. 7, 2014, pp. 107–115., http://www.ijirst.org/articles/IJIRSTV1I7017.pdf 13. The Financial Express (2019) “Kumbh Mela 2019: Pilgrims to Get Cleaner Ganga Water as UP Govt Orders Shutdown of Tanneries.” Viewed 1st December 2019. Available at: https://www.financialexpress.com/india-news/kumbh-mela-2019-pilgrims-to-get-cleaner-ganga-water-as-up-govt-orders-shutdown-of-tanneries/1421399/. 14. The Hindu Business Line (2019). Bureau, Our. “HIL's Charminar Installs Water Kiosks at Kumbh Mela 2019, viewed 15th December 2019. Available at: https://www.thehindubusinessline.com/news/hils-charminar-installs-water-kiosks-at-kumbh-mela-2019/article26139194.ece. 15. Vortmann, M., Balsari, S., Holman, S.R., & Greenough, P.G. (2015). Water, Sanitation, and Hygiene at the World’s Largest Mass Gathering. Current Infectious Disease Reports, 17, pp. 1-7. 16. World Health Organization (2015). “Guidelines for Drinking-Water Quality, Fourth Edition.” , viewed 01st December 2019 . Available at: https://www.who.int/water_sanitation_health/water-quality/guidelines/en/ 17. World Health Organization. Public health for MGs: key considerations. Geneva: WHO; 2015 18. WSSCC (2019) “WSSCC and GIWA Spread the Word on Sanitation and Water at Kumbh Mela.”, viewed 5th December 2019. Available at: https://www.wsscc.org/2019/01/25/wsscc-and-giwa-spread-the-word-on-sanitation-and-water-at-kumbha-mela/..
    4 years ago by @ijiris
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, 2017 (2): 14-27 (February 2017)
    7 years ago by @ijiris
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 21-27 (May 2023)1. Currency Recognition system using Image Processing. SANDEEP KUMAR CHAUBEY Andrew S. Morgan Kaufmann Publishers, 1995. 2. A Survey on Indian Currency Note Denomination Recognition System. Aruna Manpreet Bagga, Dr.Baljit Singh. 1995. 3. Dr. Baljith Singh, Aruna D H Indian currency note denomination system. 4. Ms. Monali Patil, Prof. Jayant Adhikari Detection of fake currency using digital image processing. 5. Arun Anoop M, Dr K.E. Kannammal Fake currency detection 6. Vidhi Roy and Sushanth Patil Fake Currency detection using image processing. 7. M. Deborah and Soniya Prathap Detection of Fake currency using edge detection. 8. Akash Rana, Avinash Kumar and Shivam Kumar Jha Detection of fake currency using machine learning technique. 9. Mayadevi, A. Gaikwad, Vaijinath, V. Bhosle and Vaibhav Currency note feature extraction. 10. Brinda M Object Detection using Haar-Like Feature Extraction..
    11 months ago by @ijiris
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 9 (2): 10-14 (May 2023)1. Adler, A.; Schuckers, S. Biometric vulnerabilities, overview. In Encyclopedia of Biometrics; Li, S.Z., Jain, A., Eds.; Springer: Boston, MA, USA, 2009. https://doi.org/10.1007/978-0-387-73003-5_65 2. Nguyen, H.T. Fingerprints Classification through Image Analysis and Machine Learning Method. Algorithms 2019, 12, 241. https://doi.org/10.3390/a12110241 3. Biometric Systems Lab—FVC2000: Fingerprint Verification Competition. Available online: FVC2000 (unibo.it)(accessed on 22 January 2021). 4. Tang, Y.; Gao, F.; Feng, J. Latent fingerprint minutia extraction using fully convolutional network. In Proceedings of the 2017 IEEE International Joint Conference on Biometrics, Denver, CO, USA, 1–4 October 2017; pp. 117–123. https://doi.org/10.1109/btas.2017.8272689 5. Huang, X.; Qian, P.; Liu, M. Latent fingerprint image enhancement based on progressive generative adversarial network. In Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, Seattle, WA, USA, 14–19 June 2020; pp. 3481–3489. https://doi.org/10.1109/cvprw50498.2020.00408 6. Neurotechnology Company—Sample Fingerprint Databases. Available online: Download biometric algorithm demo software, SDK trials, product brochures. (neurotechnology.com)(accessed on 22 January 2021). 7. Fingerprint Image identification for crime detection (2019) Fingerprint Image Identification for Crime Detection | IEEE Conference Publication | IEEE Xplore https://doi.org/10.1109/iccsp.2019.8698014.
    11 months ago by @ijiris