Volume 8, Issue 9, September 2016

 

 

A New Optimized Approach for Detection of Caries in Panoramic Images
 

A New Optimized Approach for Detection of Caries in Panoramic Images

Pages: 166-173 (8) | [Full Text] PDF (328 KB)
AA ALbahbah, HM El-Bakry, S Abd-Elgahany
Department of Information Systems, Faculty of Computer and Information Sciences, Mansoura University, Mansoura, Egypt

Abstract -
Nowadays, support vector machines (SVMs) has been used broadly to solve numerous mind boggling issues in various fields because of its capacity to sum up and classify perfectly. One of these fields is the medicinal image preparing for diagnosing purposes. In this paper, tooth caries identification system is presented in light of SVMs that trained by using practical swarm optimization (PSO). The proposed approach utilizes inter-pixel autocorrelation as input features. Experimental results prove that the proposed approach can detect tooth caries efficiently. Furthermore, it is clear that the classification accuracy is very good. In addition, the proposed approach of tooth caries detection outperforms the diagnosing process performed by a rule-based computer assisted program and a group of dentists.
 
Index Terms - Tooth Decay, SVMs, Histograms of Oriented Gradients (HOG), Caries Detection

Citation - AA ALbahbah, HM El-Bakry, S Abd-Elgahany. "A New Optimized Approach for Detection of Caries in Panoramic Images." International Journal of Computer Engineering and Information Technology 8, no. 9 (2016): 166-173.

Creating Database Queries for Dynamic Query Forms
 

Creating Database Queries for Dynamic Query Forms

Pages: 174-178 (5) | [Full Text] PDF (227 KB)
AH Shekh, R Bhoi, A Kadu
Computer Engineering, Theem College Of Engineering, Boisar, Maharastra, India

Abstract -
A form is a database object that you can use to create a user interface for a database application. A bound form is one that is directly connected to a data source such as a table or query, and can be used to enter, edit, or display data from that data source. Alternatively, you can create an unbound form that does not link directly to a data source, but which still contains command buttons, labels, or other controls that you need to operate your application. This article focuses primarily on bound forms. You can use bound forms to control access to data, such as which fields or rows of data are displayed. For example, certain users might need to see only several fields in a table with many fields.[1] Providing those users with a form that contains only those fields makes it easier for them to use the database. You can also add command buttons and other features to a form to automate frequently performed actions. Think of bound forms as windows through which people see and reach your database. An effective form speeds the use of your database, because people dont have to search for what they need. A visually attractive form makes working with the database more pleasant and more efficient, and it can also help prevent incorrect data from being entered. Modern web databases maintain large and heterogeneous data. These real-world databases contain over hundreds relations and attributes. Traditional predefined query forms are not able to satisfy various ad-hoc queries from users on those databases; a user can also fill the query form and submit queries to view the query result at each iteration. In this way, a query form could be dynamically refined till the user satisfies with the query results.
 
Index Terms - Query Form creation, User Interaction, Database, Query Form

Citation - AH Shekh, R Bhoi, A Kadu. "Creating Database Queries for Dynamic Query Forms." International Journal of Computer Engineering and Information Technology 8, no. 9 (2016): 174-178.

Implementation of Privacy Preserving Model for Shared Data in the Cloud
 

Implementation of Privacy Preserving Model for Shared Data in the Cloud

Pages: 179-183 (5) | [Full Text] PDF (317 KB)
G Rokade, S Sarode
Computer Department, MITCOE, Savitribai Phule Pune University, MS. 411030, India

Abstract -
Cloud Computing gives storage services where user can remotely stores and access data. Cloud services can be used for different purposes such as data sharing in different domain, limiting the access rights to some groups, reduces the load of maintenance and security of data on intranet network. Currently, due to failure in system, maintain the integrity of cloud data is vulnerable. However, maintaining the integrity of shared data in to cloud using public auditing is a vital task. Therefore, proposed third party auditor solution to keep and maintain integrity of data and preserve privacy of shared data in the cloud. Hashing algorithms and confidentiality algorithm with addition of salt enhance the integrity of data. In addition to above, data anonymization technique is also used to keeping the secrecy of shared data. It enhances the data protection of existing and upcoming data. Therefore, proposed system will perform audit for some specific groups or multiple users efficiently.
 
Index Terms - Cloud Computing, Public Auditing, Privacy Preserving, Data Storage

Citation - G Rokade, S Sarode. "Implementation of Privacy Preserving Model for Shared Data in the Cloud." International Journal of Computer Engineering and Information Technology 8, no. 9 (2016): 179-183.