-
An Effective Method for Fingerprint Classification
Abstract: This paper presents an effective method for fingerprint classification using data mining approach. Initially, it generates a numeric code sequence for each fingerprint image based on the ridge flow patterns. Then for each class, a seed is selected by using a frequent itemsets generation technique. These seeds are subsequently used for clustering the fingerprint images. The proposed method was test… ▽ More
Submitted 19 November, 2012; originally announced November 2012.
Comments: 9 pages, 7 figures, 6 tables referred journal publication. arXiv admin note: substantial text overlap with arXiv:1211.4503
MSC Class: 68U35 ACM Class: I.5.3
Journal ref: International A. Journal of e-Technology, Vol. 1, No. 3, pp. 89-97, January, 2010
-
An Effective Fingerprint Classification and Search Method
Abstract: This paper presents an effective fingerprint classification method designed based on a hierarchical agglomerative clustering technique. The performance of the technique was evaluated in terms of several real-life datasets and a significant improvement in reducing the misclassification error has been noticed. This paper also presents a query based faster fingerprint search method over the clustered… ▽ More
Submitted 19 November, 2012; originally announced November 2012.
Comments: 10 pages, 8 figures, 6 tables, referred journal publication
MSC Class: 68U35 ACM Class: I.5.3
Journal ref: International Journal of Computer Science and Network Security, Vol. 9, No.11, pp. 39-48, 2009
-
Survey on Incremental Approaches for Network Anomaly Detection
Abstract: As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs).… ▽ More
Submitted 19 November, 2012; v1 submitted 19 November, 2012; originally announced November 2012.
Comments: 14 pages, 1 figure, 11 tables referred journal publication
MSC Class: 68T10 ACM Class: K.6.5
Journal ref: International Journal of Communication Networks and Information Security (KUST), vol. 3, no. 3, pp. 226-239, 2011