Papers by Joy Bhattacharjee
Ijrcct, May 30, 2013
[5] proposed a method to extend the Chain Graph (CG) model to with more general topology and the ... more [5] proposed a method to extend the Chain Graph (CG) model to with more general topology and the associated methods for learning and inference.CG is a hybrid Probabilistic Graphical Model (PGM) which Contains both directed and undirected links. Its representation is powerful enough to capture heterogeneous relationships among image entities. For CG they first oversegment the image into superpixels and find out different heterogeneous relationships among image entities (superpixels, vertices or junctions, edges, regions etc.) They construct the CG model with parameterization of links with derived Joint Probability Distribution (JPD). They represent these links by either potential function or conditional probabilities. They first create a Directed Master Graph then create directed sub-graphs for some terms in the
Soft Computing Approaches for Diabetes Disease Diagnosis: A Survey
Privacy protection and fine grained access control to web database

International Journal of Computer Applications, 2013
WWW has become the center of attraction for business transactions and hence e-commerce due to its... more WWW has become the center of attraction for business transactions and hence e-commerce due to its ease of use and speed. its ability from tracking the browsing behaviour of any user to even the mouse clicks of any individual has brought the vendor and end customer closer than ever before.WWW has made it possible for vendors to advertize their products i.e. they are personalizing their product messages for individual customers at a very large scale such a phenomenon is termed as mass communication such a utility is not only applicable for e-commerce but also such personalization is aiding several web browsing activities. Any action that tailors the web experience to any individual or several users is termed as web personalization. Web personalization is that the method of customizing an internet website to the wants of specific users, taking advantage of the information noninheritable from the analysis of the user's guidance behaviour(Weblog data) in correlation with alternative data collected within the web context, namely, structure, content and user profile information. The domain of web personalization has gained importance both in the area of research and commerce. In this paper we proposed a framework of web log mining to implicit measures of user interests through Country and predicting users" future requests in WWW.
International Journal on …, 2010
Abstract-There are numbers of methods prevailing for Image Mining Techniques. This Paper includes... more Abstract-There are numbers of methods prevailing for Image Mining Techniques. This Paper includes the features of four techniques I,e Color Histogram, Color moment, Texture, and Edge Histogram Descriptor. The nature of the Image is basically based on the Human ...

A Proposed Framework to Implicit Measures of User Interests through Country and Predicting Users ‟ Future Requests in WWW
Abstract-WWW has become the center of attraction for business transactions and hence e-commerce d... more Abstract-WWW has become the center of attraction for business transactions and hence e-commerce due to its ease of use and speed. its ability from tracking the browsing behaviour of any user to even the mouse clicks of any individual has brought the vendor and end customer closer than ever before.WWW has made it possible for vendors to advertize their products i.e. they are personalizing their product messages for individual customers at a very large scale such a phenomenon is termed as mass communication such a utility is not only applicable for e-commerce but also such personalization is aiding several web browsing activities. Any action that tailors the web experience to any individual or several users is termed as web personalization. Web personalization is that the method of customizing an internet website to the wants of specific users, taking advantage of the information noninheritable from the analysis of the user's guidance behaviour(Weblog data) in correlation with al...
Abstract—The routing in Mobile Ad hoc Network (MANET) is a critical task due to dynamic topology.... more Abstract—The routing in Mobile Ad hoc Network (MANET) is a critical task due to dynamic topology. Many routing protocols were proposed which are categorized as proactive and reactive routing protocols. Route maintenance is a great challenge in MANET due to frequent link failure which causes high data loss and delay. To counter such problems, lots of link repair mechanisms were proposed, but all these have their own limitations. This paper proposes a novel routing algorithm for route maintenance based on link failure localization called DSR-LFL. DSR-LFL takes decision on the basis of location of failure link in source route. Proposed algorithm may improve the packet salvaging, delivery ratio and performance of DSR.
Cloud computing is an internet based model that enable convenient, on demand and pay per use acce... more Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user’s requirement for computing resources like networks, storage, servers, services and applications, without physically acquiring them. It reduces the overhead of the organization of marinating the large system but it has associated risks and threats also which include – security, data leakage, insecure interface and sharing of resources and inside attacks.

Image Segmentation is a technique that partitioned the digital image into many number of homogene... more Image Segmentation is a technique that partitioned the digital image into many number of homogeneous regions or sets of homogeneous pixels is called image segmentation. Efficient and effective image segmentation is an important task in computer vision and object recognition. Since fully automatic image segmentation is usually very hard for natural images, interactive schemes with a few simple user inputs are good solutions. In this paper we presents image segmentation using similar region merging and comparison among different interactive image segmentation techniques. Segmentation should stop as object of interest in an application is isolated. The ultimate goal is to make the image more simplified and that to get more meaningful to analyze. This paper deals with the several segmentation techniques using human interactions models like PGM, Bayesian Networks Unified Graphical Models, Similar region merging etc., are taken from the literature are reviewed and a new interactive method...

International Journal on Computer Science and Engineering, 2012
The routing in Mobile Ad hoc Network (MANET) is a critical task due to dynamic topology. Many rou... more The routing in Mobile Ad hoc Network (MANET) is a critical task due to dynamic topology. Many routing protocols were proposed which are categorized as proactive and reactive routing protocols. Route maintenance is a great challenge in MANET due to frequent link failure which causes high data loss and delay. To counter such problems, lots of link repair mechanisms were proposed, but all these have their own limitations. This paper proposes a novel routing algorithm for route maintenance based on Link Failure Localization called DSR-LFL. DSR-LFL takes decision on the basis of location of failure link in source route. Simulation results shows DSR-LFL improve the Packet Delivery Ratio, Throughput and decrease the Routing Overhead, End-to-End Delay as compared to Dynamic Source Routing (DSR) protocol. Keywords— DSR, MANET, DSR-LFL, routing, salvage

Information is the most valuable asset for organizations. One of the goals of organizations is to... more Information is the most valuable asset for organizations. One of the goals of organizations is to share their data and at the same time to enforce their policies. Web database is a combined production with database technology and Web technology. Web database is placed on the Internet, there are many security problems. The secrecy and the integrity are two important demands of security system. When database access control and the network security are addressed separately, the security systems are not optimized sufficiently as a whole. Finegrained access control (FGAC) must be supported by web relational databases to satisfy the requirements of privacy preserving and Internet-based applications. We propose a model of integrating network security with criterion based access control to handle network security and the fine grained Web database access control simultaneously. We have implemented our model in college database and performance is evaluated. Whenever any unauthorized user altered our data a system called Web-Secure report to the authorized user via E-mail or Short Message Service (SMS). The implementation results show that how our model is suitable for web database security.
Communications on Applied Electronics, 2015
With the advent of Arpanet the potential capabilities of information sharing was very well recogn... more With the advent of Arpanet the potential capabilities of information sharing was very well recognized and gradually the world is gifted with the ocean of Information I.e. the Internet .There is continuous inflow of information , the information may be of any kind be it texts, audio, images or it may be the audio visual information. Thus, the users are flooded with information. Due to this flooding, it is also important to see that right information may be provided to the right person at right time or 3R's, but many a times it does not happen. This paper studies various approaches by noted researchers, academician and their contributions to the multimedia retrieval systems. This paper also tries to bring out some pros and cons of the different approaches.
International Journal, 2011
Cloud computing is an internet based model that enable convenient, on demand and pay per use acce... more Cloud computing is an internet based model that enable convenient, on demand and pay per use access to a pool of shared resources. It is a new technology that satisfies a user's requirement for computing resources like networks, storage, servers, services and ...
A Comparative Study of Discrete Cosine Transformation, Haar Transformation, Simultaneous Encryption and Compression Techniques
2009 International Conference on Digital Image Processing, 2009
There are number of still image encryption schemes proposed like fuzzy based image encryption sch... more There are number of still image encryption schemes proposed like fuzzy based image encryption scheme [18]. This scheme likes to be more complex. Most of the traditional or modern crypto systems are designed to protect textual data [17], an original important and confidential ...
Uploads
Papers by Joy Bhattacharjee