Skip to main content

Showing 1–3 of 3 results for author: Bhuyan, M H

Searching in archive cs. Search in all archives.
.
  1. arXiv:1211.4658  [pdf

    cs.CV cs.CR

    An Effective Method for Fingerprint Classification

    Authors: Monowar H. Bhuyan, Sarat Saharia, Dhruba Kr Bhattacharyya

    Abstract: This paper presents an effective method for fingerprint classification using data mining approach. Initially, it generates a numeric code sequence for each fingerprint image based on the ridge flow patterns. Then for each class, a seed is selected by using a frequent itemsets generation technique. These seeds are subsequently used for clustering the fingerprint images. The proposed method was test… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 9 pages, 7 figures, 6 tables referred journal publication. arXiv admin note: substantial text overlap with arXiv:1211.4503

    MSC Class: 68U35 ACM Class: I.5.3

    Journal ref: International A. Journal of e-Technology, Vol. 1, No. 3, pp. 89-97, January, 2010

  2. arXiv:1211.4503  [pdf

    cs.CV cs.CR

    An Effective Fingerprint Classification and Search Method

    Authors: Monowar H. Bhuyan, D. K. Bhattacharyya

    Abstract: This paper presents an effective fingerprint classification method designed based on a hierarchical agglomerative clustering technique. The performance of the technique was evaluated in terms of several real-life datasets and a significant improvement in reducing the misclassification error has been noticed. This paper also presents a query based faster fingerprint search method over the clustered… ▽ More

    Submitted 19 November, 2012; originally announced November 2012.

    Comments: 10 pages, 8 figures, 6 tables, referred journal publication

    MSC Class: 68U35 ACM Class: I.5.3

    Journal ref: International Journal of Computer Science and Network Security, Vol. 9, No.11, pp. 39-48, 2009

  3. arXiv:1211.4493  [pdf

    cs.CR cs.NI

    Survey on Incremental Approaches for Network Anomaly Detection

    Authors: Monowar H. Bhuyan, D. K. Bhattacharyya, J. K. Kalita

    Abstract: As the communication industry has connected distant corners of the globe using advances in network technology, intruders or attackers have also increased attacks on networking infrastructure commensurately. System administrators can attempt to prevent such attacks using intrusion detection tools and systems. There are many commercially available signature-based Intrusion Detection Systems (IDSs).… ▽ More

    Submitted 19 November, 2012; v1 submitted 19 November, 2012; originally announced November 2012.

    Comments: 14 pages, 1 figure, 11 tables referred journal publication

    MSC Class: 68T10 ACM Class: K.6.5

    Journal ref: International Journal of Communication Networks and Information Security (KUST), vol. 3, no. 3, pp. 226-239, 2011