- Biometric Identification and Security
- Multi-Criteria Decision Making
- Face and Expression Recognition
- Rough Sets and Fuzzy Logic
- Cryptography and Data Security
- Intuitionistic Fuzzy Systems Applications
- Fuzzy and Soft Set Theory
- Image Retrieval and Classification Techniques
- Face recognition and analysis
- User Authentication and Security Systems
- Dermatoglyphics and Human Traits
- Forensic Fingerprint Detection Methods
- Advanced Authentication Protocols Security
- Imbalanced Data Classification Techniques
- Fuzzy Systems and Optimization
- Data Mining Algorithms and Applications
- Coding theory and cryptography
- Security in Wireless Sensor Networks
- Remote-Sensing Image Classification
- Advanced Algebra and Logic
- Fuzzy Logic and Control Systems
- Crime Patterns and Interventions
- Advanced Image and Video Retrieval Techniques
- Sex work and related issues
- DNA and Biological Computing
Vellore Institute of Technology University
2015-2025
In this paper, we define bipolar intuitionistic fuzzy sets, relations, graphs, isomorphism of these graphs and discussed some their properties
In recent years, the growth of IoT applications is rapid in nature and widespread across several domains. This tremendous leads to various security privacy concerns. The existing algorithms fail provide improved features devices due its resource constrained (inability handle a huge amount data). this context, authors propose cloud-assisted proxy re-encryption scheme for efficient data sharing systems. proposed approach solves root extraction problem using near-ring. improves measures system....
Latent fingerprints are acquired from crime places which utilised to distinguish suspects in inspection. In general, latent contain mysterious ridge and valley structure with nonlinear distortion complex background noise. These lead fundamentally difficult problem for further analysis. Hence, the image quality is required matching those fingerprints. this work, we develop a model, needs manually marked region of interest enhancement matching. The proposed model includes two phases: i)...
In our innovative crime location forecast method, at the outset, features are mined from database and used for performing adaptive mutation-based artificial bee colony (AMABC) algorithm, in which attributes values bunched together. Subsequently, frequent closed itemsets lattice (FCIL) is built by rules support factor values, this extracted. course of FCIL creation, clustered processed like a sliding window. accordance with rules, related locations created. Thus, proposed factor-based...
Latent fingerprints are acquired from crime places which utilised to distinguish suspects in inspection. In general, latent contain mysterious ridge and valley structure with nonlinear distortion complex background noise. These lead fundamentally difficult problem for further analysis. Hence, the image quality is required matching those fingerprints. this work, we develop a model, needs manually marked region of interest enhancement matching. The proposed model includes two phases: i)...
Fingerprint matching is one of the most important problems in Automatic Identification System (AFIS). It has emerged as an effective tool for human recognition due to its uniqueness, universality and invariability. The significance this work monitor similarity two or more fingerprint images simultaneously. This proposed algorithm been formulated based on minutiae points which examine n number images.
In this paper, we present aweighted arithmetic average operator based on intervalvalued intuitionistic fuzzy values and their application to multi criteria decision making for investment. Based the scoring value method of interval-valued decision-maker with respect alternatives
Abstract A latent fingerprint is an interesting issue because of it has attained from crime places and moreover contained a low quality image, less number features unwanted noises. It necessity to extract the original image with exact boundary surface for further processing such as authentication, identification matching. In this work, new distance measure been proposed edge detection using Intuitionistic Type-2 Fuzzy Entropy (IT2FE) comprehensible definition made Sets (IT2FS). IT2FS takes...
In the recent era, technological approaches to a problem can be made solve it easily. There are many technical ways according types of problem. Classification makes that identify character. Clustering is one technique classify and grouping objects. has hundreds different group more than 50 years history behind it. this article, we take study on cluster's definitions, types, algorithms try analyze results. As well as give literature survey based data clustering, pattern recognition, image...
In stock marketing, picking the right depends on true value and ability to pick is crucial as it influences profit of investors. Data mining techniques have been used for forecasting market price shown successful results too. Yet, investors are looking a genuine model predict rule more efficiently. This work intends form technique based association using enhanced apriori algorithm with modified genetic estimation fine rule. The mainly focuses hence avoid time computation complexity. GA uses...
As a latest biometric technique, finger vein recognition has been proved to be one of the most reliable technology for personal authentication and security. The uncertainties ambiguity in extraction can handled more efficiently using fuzzy theory based techniques. Mamdani inference system is presented this paper locating patterns image. A comparative analysis results performed with some standard
In this paper, the fingerprint authentication is obtained by using fuzzy logic system, which based on bell shaped intuitionistic number. The minutiae points extracted from images are treated as a important of proposed work to find out two identical points, these selects optimal set and reduce error between system. system provides an adequate description algorithm. uniqueness process consisting smaller number calculations better than previous methods.
In this paper, two new Operator defined over IVIFSs were introduced, which will be “Multiplication of an IVIFS with and Multiplication the natural number ”are proved.
Finger vein recognition is a recently explored biometric system, renowned for its accuracy and reliability. Even though finger system possesses exceptional qualities against other biometrics, it quite challenging to extract enough number of reliable consistent features matching. Due light scattering irregularities in the imaging procedures, images often possess random distortions affine issues. In this paper, efficiency invariant feature matching investigated framework biometrics. order...