Papers by pravin kalyankar
International Journal of Engineering and Computer Science, Aug 3, 2016
CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart.... more CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart.This test is taken to insure that the user is a human being and not the machine or any program.It contains different types of tests which can only be solved by the humans.this is because to avoid bad interface of machines in an application. Captcha as graphical passwords (CaRP) is one of the new security built on Captcha technology. As its name implies that CaRP is the combination of both CAPTCHA and Graphical password scheme. CaRP addresses a number of security problems altogether, it offers reasonable security and usability with some practical applications for improving online security.

IOSR journal of engineering, May 1, 2013
In most commercial and legal transactions, the ability to hold individuals or organizations accou... more In most commercial and legal transactions, the ability to hold individuals or organizations accountable for transactions is important. Accountability is an important aspect of any computer system. It assures that every action executed in the system can be traced back to some entity. Accountability is even more crucial for assuring the safety and security. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. In particular, we propose an object centered approach that enables enclosing our logging mechanism together with users' data and policies. We influence the JAR programmable capabilities to both create a dynamic and travelling object and to ensure that any access to user's data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanism.
International journal of computer applications, May 17, 2017
In this paper, an effective biometrics method based on hand geometry is presented for biometric i... more In this paper, an effective biometrics method based on hand geometry is presented for biometric identification or verification system. Biometrics-based authentication is a verification approach using the biological features inherent in each individual. They are processed based on the identical, portable, and arduous duplicate characteristics. The principal lines and texture are two kinds of salient features of palmprint. A few years ago , a new branch of biometrics technology, palmprint authentication was proposed whereby line and points are extracted from palms for personal identification. In this paper, we consider palmprint as a piece of lines and texture and apply palmprint identification techniques for extracting feature to palmprint authentication.

Image Search Re-ranking based on Prototype
Till now whatever the methods are available for image search are based on the text provided in th... more Till now whatever the methods are available for image search are based on the text provided in the search. but such kind of image search re-ranking suffer from unreliability because the resulting images contain more irrelevant images that of the serach. Hence the re-ranking concept arises to re-rank the retrieved images based on the text surrounding the image and metadata and visual feature. In this paper, we propose an “Image Search Re-ranking Based on Prototype” a prototype based method to learn reranking function from human labeled samples . Based on images obtained in initial search result , visual prototype will be generated. Each prototype is used to construct a meta reranker to produce a reranking score for any other image from initial set. Finally all scores from all meta rerankers are aggregated. For visual reranking we use SVM algorithm.
An Updated Systematic Review on Remdesivir’s Safety and Efficacy in Patients Afflicted With COVID-19
Cureus
Application of Nanotechnology for Diagnosis and Drug Delivery in Atherosclerosis: A New Horizon of Treatment
Current Problems in Cardiology
Compartment syndrome due to murrel fish bite
Journal of the Indian Society of Toxicology
International journal of computer and communication technology, 2015
Most search engines are not provided the facility of expected results every time. Because two wor... more Most search engines are not provided the facility of expected results every time. Because two words can have same meaning e.g. if query "block size" is entered in search engine then search engine will display the records related to operating system as well as the living apartment block size. But search engine don't know about what actually user expect. That is data related to operating system or data related to living apartment. So generally it will display both type of links In this paper we are managing the search engines on the fly. That is the paper is related to personalize the search of user on the fly without asking users to tagging or rating for the page.

Two techniques have been chosen to produce the 3D models. The first technique is known as Volume ... more Two techniques have been chosen to produce the 3D models. The first technique is known as Volume Rendering and the second technique is known as the Marching Cubes Algorithm. Both techniques use voxels (3D square pixels) to determine the 3D area to be constructed. The Marching Cubes (MC) algorithm by Lorensen and Cline is most popular algorithm for extraction of isosurface out of volume data. Several drawbacks of MC algorithm are solved by using new improved version of MC algorithm. We proposed an improved version of the Marching Cubes algorithm which gives a topologically correct triangular approximation of the isosurface for any cube configuration. Unlike the past work on Marching Cube algorithm, a robust triangulation strategy, complementary and rotation operations is presented. Our algorithm is adaptive to the small the changes of data or the small changes of the threshold, and obtains more reasonable result of triangulation of isosurface than those produced by standard MC algori...

Chronobiology in Medicine, 2021
The aim of the study is to find out any association between time of death in coronavirus disease ... more The aim of the study is to find out any association between time of death in coronavirus disease (COVID-19) patients and variables like age, sex, and existence of comorbidities including type II diabetes mellitus, hypertension, coronary artery disease, chronic kidney disease, etc. An attempt was also made to elucidate the reasons for relationship between time of death and other aforementioned variables. Mortality data of 1,553 COVID-19 cases from a tertiary care hospital between March 2020 to September 2021 were analyzed. Maximum deaths occurred between 18:01 hours to 06:00 hours of the 24-hour cycle. There is a significant statistical association between time of death and age, time of death and sex, time of death and having a comorbidity of diabetes mellitus in the study sample. The study confirms that the chronofatality of COVID-19 deaths has a nocturnal predilection. The circadian rhythms of glucocorticoids, respiratory physiology of sleep, and circadian hemodynamic variations ma...
3D volume rendering algorithm
This paper presents an analysis of the algorithms used for generating 3D structures from 2D CT-Sc... more This paper presents an analysis of the algorithms used for generating 3D structures from 2D CT-Scan Datasets. This is achieved by developing an implementation of Marching Cubes, a surface construction algorithm that’s currently the standard used for 3D surface construction in the medical visualization industry. Two techniques have been chosen to produce the 3D models. The first technique is known as Volume Rendering and the second technique is known as the Marching Cubes Algorithm. Both techniques use voxels (3D square pixels) to determine the 3D area to be constructed. The Marching Cubes (MC) algorithm by Lorensen and Cline is most popular algorithm for extraction of isosurface out of volume data. Several drawbacks of MC algorithm are solved by using new improved version of MC algorithm.
Palmprint Based Identification Using Principal Line Approach
A principal line approach is used for identify accurate person based on palmprint biometrics. Pal... more A principal line approach is used for identify accurate person based on palmprint biometrics. Palmprint is the one of the important biometrics characteristics with higher user acceptance.The palmprint are most important feature for personal identification.In this paper,the principal lines are extracted by using canny edge detection operation.The canny edge detection algorithm consist of 5 modules such as image acquisition.image preprocessing,line feature extraction ,template generation, and matching.Then finally, identify accurate person. Keywords—Principle line approach, palmprint, canny edge detection algorithm, Biometrics.

An Efficient Blocking System for Hacking Users in Anonymizing Networks
International Journal of Global Technology Initiatives, 2013
In order to allow users to access Internet services privately, anonymizing networks like Tor uses... more In order to allow users to access Internet services privately, anonymizing networks like Tor uses a series of routers to hide the client’s IP address from the server. The success of such networks, however, has been limited by users employing this anonymity for abusive purposes such as defacing popular websites. Usually, web site administrators rely on IP-address blocking in order to disable access to misbehaving users, but it is impractical if the abuser routes through an anonymizing network. In order to avoid this, administrators block all known exit nodes of the anonymizing network, denying anonymous access to misbehaving and behaving users alike. To solve this issue, we introduce Nymble, a system where servers blacklist misbehaving users, thereby blocking users without affecting their anonymity. In Nymble, (1) honest users remain anonymous and their requests unlinkable; (2) a server can complaint about a particular anonymous user and gain the ability to blacklist the user for fut...

Two techniques have been chosen to produce the 3D models. The first technique is known as Volume ... more Two techniques have been chosen to produce the 3D models. The first technique is known as Volume Rendering and the second technique is known as the Marching Cubes Algorithm. Both techniques use voxels (3D square pixels) to determine the 3D area to be constructed. The Marching Cubes (MC) algorithm by Lorensen and Cline is most popular algorithm for extraction of isosurface out of volume data. Several drawbacks of MC algorithm are solved by using new improved version of MC algorithm. We proposed an improved version of the Marching Cubes algorithm which gives a topologically correct triangular approximation of the isosurface for any cube configuration. Unlike the past work on Marching Cube algorithm, a robust triangulation strategy, complementary and rotation operations is presented. Our algorithm is adaptive to the small the changes of data or the small changes of the threshold, and obtains more reasonable result of triangulation of isosurface than those produced by standard MC algori...

Efficient Mining and Hiding of Sensitive Association Rule
There are several mining algorithms of association rules. One of the most popular algorithm is Ap... more There are several mining algorithms of association rules. One of the most popular algorithm is Apriori algorithm that is used to extract frequent itemsets from large databases. Based on this algorithm, this paper is organized into two parts in first part of paper an Improved Apriori Algorithm is being presented that efficiently generates association rules. These reduces unnecessary database scan at time of forming frequent large itemsets. In second part of this paper we have tried to give contribution to improved Apriori algorithm by hiding sensitive association rules which are generated by applying improved Apriori algorithm on supermarket database. In this paper we have used innovative approach that strategically modifies few transactions in transaction database to decrease support and confidence of sensitive rule without producing any side effects.

National Journal of Clinical Anatomy, 2013
Hemiazygos vein and Accessory hemiazygos vein lie on the left side in the posterior mediastinum o... more Hemiazygos vein and Accessory hemiazygos vein lie on the left side in the posterior mediastinum of thorax and are the counterpart of azygos vein on right side. During routine cadaveric dissection of thoracic region in an adult male, we found an abnormal venous channel which was single and was lying on the left side of the vertebral column. It received tributaries from superior intercostal vein and posterior intercostal veins. We found this abnormal venous channel draining directly into left brachiocephalic vein in contrast to its usual drainage into azygos vein. Hence this can be considered as abnormal venous channel and variant of hemiazygos vein and accessory hemiazygos vein. The azygos and hemiazygos venous system is commonly encountered during surgical intervention performed on posterior thoracic wall. This case report provides a new data of potential clinical significance.
International Journal of Computer Applications, 2017
In this paper, an effective biometrics method based on hand geometry is presented for biometric i... more In this paper, an effective biometrics method based on hand geometry is presented for biometric identification or verification system. Biometrics-based authentication is a verification approach using the biological features inherent in each individual. They are processed based on the identical, portable, and arduous duplicate characteristics. The principal lines and texture are two kinds of salient features of palmprint. A few years ago , a new branch of biometrics technology, palmprint authentication was proposed whereby line and points are extracted from palms for personal identification. In this paper, we consider palmprint as a piece of lines and texture and apply palmprint identification techniques for extracting feature to palmprint authentication.
International Journal Of Engineering And Computer Science, 2016
CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart.... more CAPTCHAs are short for Completely Automated Public Turing test to tell Computer and Humans Apart.This test is taken to insure that the user is a human being and not the machine or any program.It contains different types of tests which can only be solved by the humans.this is because to avoid bad interface of machines in an application. Captcha as graphical passwords (CaRP) is one of the new security built on Captcha technology. As its name implies that CaRP is the combination of both CAPTCHA and Graphical password scheme. CaRP addresses a number of security problems altogether, it offers reasonable security and usability with some practical applications for improving online security.

IOSR Journal of Engineering, 2013
In most commercial and legal transactions, the ability to hold individuals or organizations accou... more In most commercial and legal transactions, the ability to hold individuals or organizations accountable for transactions is important. Accountability is an important aspect of any computer system. It assures that every action executed in the system can be traced back to some entity. Accountability is even more crucial for assuring the safety and security. A major feature of the cloud services is that users' data are usually processed remotely in unknown machines that users do not own or operate. Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis, we propose a novel highly decentralized information accountability framework to keep track of the actual usage of the users' data in the cloud. In particular, we propose an object centered approach that enables enclosing our logging mechanism together with users' data and policies. We influence the JAR programmable capabilities to both create a dynamic and travelling object and to ensure that any access to user's data will trigger authentication and automated logging local to the JARs. To strengthen user's control, we also provide distributed auditing mechanism.
IEEE Transactions on Knowledge and Data Engineering, 2013
Uploads
Papers by pravin kalyankar