Bansu S.P.,PIIT |
Govilkar S.S.,TSEC |
Proceedings - 2014 IEEE International Conference on Advances in Communication and Computing Technologies, ICACACT 2014 | Year: 2014
Over the years, the volume of information available through the World Wide Web has been increasing continuously; unfortunately, the unstructured nature and huge volume of information accessible over networks have made it increasingly difficult to find the relevant information. The information retrieval techniques commonly used are based on keywords, wherein provided keyword list doesn't consider the semantic relationship between keywords nor it consider the meaning of words and phrases. With such system, users frequently have problems expressing their information needs and translation those needs into requests. To overcome the limitations of keyword-based information retrieval, one must think of introducing conceptual knowledge to information retrieval which will help users to formulate their request. The semantic knowledge attached to information is united by means of ontologies. The mapping of concepts in information into conceptual models i.e. ontology appears to be useful method for moving from keyword based to concept based information retrieval. This paper proposes conceptual framework for Ontology Based Information Retreival System. ©2014 IEEE.
Perez-Isidoro R.,PIIT |
Biochimica et Biophysica Acta - Biomembranes | Year: 2016
We study how zwitterionic and anionic biomembrane models interact with neurotransmitters (NTs) and anesthetics (ATs) in the presence of Ca2 + and different pH conditions. As NTs we used acetylcholine (ACh), γ-aminobutyric acid (GABA), and L-glutamic acid (LGlu). As ATs, tetracaine (TC), and pentobarbital (PB) were employed. By using differential scanning calorimetry (DSC), we analyzed the changes such molecules produce in the thermal properties of the membranes. We found that calcium and pH play important roles in the interactions of NTs and ATs with the anionic lipid membranes. Changes in pH promote deprotonation of the phosphate groups in anionic phospholipids inducing electrostatic interactions between them and NTs; but if Ca2 + ions are in the system, these act as bridges. Such interactions impact the physical properties of the membranes in a similar manner that anesthetics do. Beyond the usual biochemical approach, we claim that these effects should be taken into account to understand the excitatory-inhibitory orchestrated balance in the nervous system. © 2016 Elsevier B.V.
Mhatre S.G.,PIIT |
Kumar Varma S.,PIIT |
Proceedings - International Conference on Technologies for Sustainable Development, ICTSD 2015 | Year: 2015
Surveillance is the monitoring of the behavior, activities, or other changing information, usually of people for the purpose of influencing, managing, directing, or protecting them. As security is becoming the primary concern of society and hence having a security system is becoming a big requirement. Video surveillance plays a vital role in security systems. This paper describes the ability to recognise objects and humans, to describe their actions and interactions from information acquired by sensors using absolute difference motion detection technique. Real-time implementation is achieved by using a Global System for Mobile Communication (GSM) modem for SMS (Short Message Service) notification. The ablity of tracking and recognition of the visual device was implemented using OpenCVTM for displaying an output. The detected objects motion is being captured and stored in HDD. © 2015 IEEE.
Mohite A.,PIIT |
2015 International Conference on Pervasive Computing: Advance Communication Technology and Application for Society, ICPC 2015 | Year: 2015
Today, database is considered as one of the major source of information. Data stored in database can be accessed by using SQL queries. Those who are expert in SQL language can access information from database but non-technical user cannot retrieve data from database such as MySQL and oracle. There is need to provide natural language interface to database for non-technical users. In this paper we have discussed design and implementation of a system using modified word co-occurrence matrix method which will provide access to database using queries in English language. © 2015 IEEE.
George J.,PIIT |
Varma S.,PIIT |
11th IEEE India Conference: Emerging Trends and Innovation in Technology, INDICON 2014 | Year: 2015
Watermarking technique is used for protecting of digital images. In this paper, we propose a novel technique for watermarking using DWT and SVD. DWT ensures imperceptibility of the watermark and SVD ensures its robustness against attacks. To address the issue of watermark security, we make use of Arnold transform. Watermark extraction is semi-blind, which avoids the need for original image for extraction. Both watermark and cover image are color images. Performance of the system is judged by using PSNR and Correlation Coefficient values. System shows good robustness against noise, JPEG compression, filtering and cropping. © 2014 IEEE.
Kumar D.G.,PIIT |
Journal of Computer Virology and Hacking Techniques | Year: 2015
With the rapid development of Internet, more and more organizations connect their databases to the Internet for resource sharing. However, due to developers’ lack of knowledge of all possible attacks, web applications become vulnerable to multiple attacks. Thus the network databases could face multiple threats. Web applications generally consist of a three tier architecture where database is in the third pole, which is the most valuable asset in any organization. SQL injection is an attack technique used to exploit code by altering back-end SQL statements through manipulating input. An attacker can directly compromise the database, that’s why this is a most threatening attack. SQL injection attack occupies first position in top ten vulnerabilities as specified by Open Web Application Security Project . It is probably the most common Website vulnerability today! Current scenarios which provide solutions to SQL injection attack either have limited scope i.e. can’t be implemented in all platforms or do not cover all types of SQL injection attacks. In this work we implement Detection Block model against SQL injection attacks. The model works both on client and server side. Client side implements a filter function and server side is based on information theory. MAC static and dynamic query which is derived from entropy is compared to detect an attack. © 2014, Springer-Verlag France.
Varma S.,PIIT |
Smart Innovation, Systems and Technologies | Year: 2015
Local binary pattern (LBP) operator is defined as gray-scale invariant texture measure. The LBP operator is a unifying approach to the traditionally divergent statistical and structural models for texture analysis. In this paper the LBP, its variants along with Gabor filters are used as a texture feature for contentbased video retrieval (CBVR). The combinations of different thresholds over different pattern using Gabor filter bank are experimented to compare the retrieved video documents. The typical system architecture is presented which helps to process query, perform indexing, and retrieve videos form the given video datasets. The precision and mean average precision (MAP) are used over the recent large TRECViD 2010 and YouTube Action video datasets to evaluate the system performance. We observe that the proposed variant features used for video indexing and retrieval is comparable and useful, and also giving better retrieval efficiency for the above available standard video datasets. © Springer India 2015.