bookmarks  

    No matching posts.
  • ⟨⟨
  • ⟩⟩

publications  4  

  •  

    . International Journal of Innovative Research in Information Security, 7 (9): 99-104 (October 2020)1. Frase, H.S.F., et.al., “Comparing complex diagnoses a formative evolution of the heart disease program”, MIT Lab for Computer Science, Cambridge, MA(2001) 2. Salem, A.M. Raushdy, M and HodHod, R.A., “ A rule based expert system for diagnosis of Heart disease”, 8th International conference on soft Computing MENDEL, Brno, Czech Republic, June 5-7, PP 258-263(2002). 3. Shaikh Abdul Hannan, V. D. Bhagile, R. R. Manza, R. J. Ramteke, "Development of an Expert System for Diagnosis and appropriate Medical Prescription of Heart Disease Using Support Vector Machine and Radial Basis Function", International Journal of Computer Science and Information Security, (IJCSIS) August issue (Vol. 8 No. 5), 2010, Pages/record No.: 245-254. ISSN: 19475500. 4. I. Turkoglu, A. Arslan, E. Ilkay, “An expert system for diagnosis ofhe heart valve diseases”, Expert Systems with Applications vol.23,pp. 229–236, 2002. 5. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 6. Mrs. Bharati M. Ramageri, “Data Mining Techniques And Applications”,Bharati M. Ramageri / Indian Journal of Computer Science and Engineering Vol. 1 No. 4 pp 301-305. 7. Shaikh Abdul Hannan, R. R. Manza and R.J. Ramteke, “Association Rules for Filtering The Medicine To Avoid Side Effects Of Heart Patients”, on 16 -19 Dec 2009, at Advances in Computer Vision and Information Technology – 09, Dr. Babasaheb Ambedkar Marathwada University, Aurangabad. 8. Rajeswari K, Vaithiyanathan V, P. Amirtharaj “Application of Decision Tree Classifiers in Diagnosing Heart Disease using Demographic Data” American Journal of Scientific research ISSN 2301-2005 pp. 77-82 EuroJournals Publishing, 2012. 9. Shaikh Abdul Hannan, Jameel Ahmed, Naveed Ahmed, Rizwan Alam Thakur, “Data Mining and Natural Language Processing Methods for Extracting Opinions from Customer Reviews”, International Journal of Computational Intelligence and Information Security, pp 52-58, Vol. 3, No. 6, July 2012. ( ISSN: 1837-7823). 10. Haque ME, Sudhakar KV. ANN back propagation prediction model for fracture toughness in microalloy steel. Int J Fatique 2002;24:1003–10. 11. Shaikh Abdul Hannan, "Heart Disease Diagnosis by using FFBP and GRNN algorithm of Neural Network", International Journal of Computer Science and Information Security, Vol 12, Number 6, June 2014, ISSN 1945-5500, United States of America. 12. Celikoglu HB. Application of radial basis function and eneralized regression neural networks in non-linear utility function specification for travel mode choice modelling. Math Comput Model 2006;44:640–58. 13. Mohammad Eid Alzaharani, Shaikh Abdul Hannan, “Diagnosis and Medical Prescription of Heart Disease Using FFBP, SVM and RBF”, Issue,1, Vol 5, , KKU Journal of Basic and Applied Sciences, Mar 2019 , Page 6-15. 14. Santosh Maher, Shaikh Abdul Hannan, Sumegh Tharewal, K. V. Kale " HRV based Human Heart Disease Prediction and Classification using Machine Learning " December 2019, (Vol. 17 No. 2 International Journal of Computer Science and Application (IJCA), New York, USA. 15. Kusuma.S1, Divya Udayan, “Machine Learning and Deep Learning Methods in Heart Disease (HD) Research, International Journal of Pure and Applied Mathematics, Volume 119 No. 18 2018, 1483-1496, ISSN: 1314-3395 (on-line version)url:http://www.acadpubl.eu/hub/Special Issue. 16. Akram Ablsubari, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, Rakesh Ramteke, "Composite Feature Extraction and Classification for Fusion of Palmprint and Iris Biometric Traits", Engineering Technology and Applied Science Research, (ETASR) Volume 9, No 1, Feb 2019, ISSN: 2241-4487, Greece. 17. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, “Review on HRV based Prediction and Detection of Heart Disease”, International Journal of Computer Applications (0975 – 8887), Pag 7-12, Volume 179 – No.46, June 2018. 18. Yogesh Rajput, Shaikh Abdul Hannan, Mohammed Eid Alzaharani, D. Patil Ramesh Manza, Design and Development of New Algorithm for person identification Based on Iris statistical features and Retinal blood Vessels Bifurcation points” ” International Conference on Recent Trends in Image Processing & Pattern Recognition (RTIP2R), December 21-22, 2018, India. 19. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 20. C.Sowmiya, Dr.P.Sumitra, “Analytical Study of Heart Disease Diagnosis Using Classification Techniques” 2017 IEEE International Conference On Intelligent Techniques In Control, Optimization And Signal Processing, 978-1-5090-4778-9/17/$31.00 ©2017 IEEE. 21. Santosh K. Maher, Sumegh Tharewal, Abdul Hannan, K. V. Kale “Review on HRV based Prediction and Detection of Heart Disease” International Journal of Computer Application(IJCA), Vol. 179, Number 46, June 2018, ISSN 0975-8887, USA. 22. Rifki Wijaya, Ary Setijadi Prihatmanto,et.al “Preliminary Design of Estimation Heart disease by using machine learning ANN within one year” , 2013 Joint International Conference on Rural Information & Communication Technology and Electric-Vehicle Technology (rICT & ICeV-T) November 26-28, 2013, Bandung-Bali, Indonesia, 978-1-4799-3365-5/13/$31.00 ©2013 IEEE. 23. Yogesh, Abdul Hannan, Rahul Sagar, Kishor Jave, Identification and Counting Trees from Oil Palm Plantations Using Digital Image Processing Techniques, International Journal of Engineering Research & Technology (IJERT), Vol. 6 Issue 05, May – 2017, ISSN: 2278-0181. 24. Mahammed Waseem, Naushad Ahmed Osmani, Shaikh Abdul Hannan, “A Survey on E-education of information and Communication ‘Technology”, European Journal of Computer Science and Information Technology (EJCSIT), Vol. 4, Issue 6, ISSN 2054-0965, October 2016. 25. H. Uguz, A. Arslan, I. Turkoglu, Ä biomedical system based on hidden Markov model for diagnosis of the heart valve diseases", Pattern Recognition Letters vol.28 pp.395–404, (2007). 26. Mr.Deepak.C.Dhanwani,et.al.,"Survey on Various Techniques of Brain Tumor Detection from MRIImages", International Journal of Computational Engineering Research Vol, 04,Issue, 1,January-2014. 27. Shaikh Abdul Hannan, Bharatratna P. Gaikwad, Ramesh Manza, "Brain Tumor from MRI Images : A Review". International Journal of Scientific and Engineering Research (IJSER), Volume 5, Issue 4, April-2014 ISSN 2229-5518, France. 28. Aqueel Ahmed, Shaikh Abdul Hannan, “Data Mining Techniques to Find Out Heart Diseases: An Overview”, International Journal of Innovative Technology and Exploring Engineering (IJITEE), An ISO 9001:2008 Certified International Journal, Volume-1, Issue-4, September 2012, ISSN: 2278-3075, New Delhi, India. 29. M. J. Baheti, A. V. Mane, Shaikh Abdul Hannan, K. V. Kale, “Comparison of PCA and SVM for a west Indian Script- Gujarati”, CiiT Journal of Digital Image Processing, Vol. 3. No. 11, pp. 709-715, July 2011. 30. Karaolis, M.A. Moutiris, J.A. Hadjipanayi, D. Pattichis, C.S., “Assessment of the Risk Factors of Coronary Heart Events Based on Data Mining With Decision Trees” IEEE Transactions on Information Technology in Biomedicine, pp 559 -566, May 2010. 31. Nikhil Gawande , Alka Barhatte , Heart Diseases Classification using Convolutional Neural Network, Proceedings of the 2nd International Conference on Communication and Electronics Systems (ICCES), IEEE, 2017. 32. Mir Arif Ali, Shaikh Abdul Hannan, Ä Review on Modern and Classical Encryption Techniques", International Journal of Engineering Trends and Technology, Volume 12, Number 4, June 2014, ISSN 2231-5381, India. 33. Aufzalina Mohd Yusof, Nor Azura Md. Ghani, Khairul Asri Mohd Ghani, Khairul Izan Mohd Ghani, A predictive model for prediction of heart surgery procedure, Indonesian Journal of Electrical Engineering and Computer Science Vol. 15, No. 3, September 2019. 34. Amin Ul Haq, Jian Ping Li, Muhammad Hammad Memon, Shah Nazir, Ruinan Sun, A Hybrid Intelligent System Framework for the Prediction of Heart Disease Using Machine Learning Algorithms, Hindawi Mobile Information Systems Volume 2018. 35. X. Li, J. Chen, G. Zhao and M. Pietikainen, “Remote Heart Rate Measurement from Face Videos under Realistic Situations”, Proceedings of IEEE International Conference on Computer Vision and Pattern Recognition, pp. 4264- 4271, 2014. 36. Shaikh Abdul Hannan, A.V. Mane, R. R. Manza and R. J. Ramteke, “Prediction of Heart Disease Medical Prescription Using Radial Basis Function", IEEE International Conference on Computational Intelligence and Computing Research at Tamilnadu College of Engineering, Coimbatore, Tamilnadu, India, ICCIC-2010, December 28-29, 2010. 37. Y. Pei, S. Zhao, X. Yang, J. Cao and Y. Gong, “Design Optimization of a SRM Motor by a Nature-Inspired Algorithm: Multi-Verse Optimizer”, Proceedings of IEEE International Conference on Industrial Electronics and Applications, pp. 1870-1875, 2018. 38. Shaikh Abdul Hannan, V.D. Bhagile, R. R. Manza and R.J. Ramteke, “Expert System for Diagnosis and Appropriate Medical Prescription of Heart Disease Using Radial Basis Function”, CiiT International Journal of Artificial Intelligent Systems and Machine Learning, Vol 2, No 8 (2010), pp 184-193, ISSN 0974–9667. 39. Durairaj M, Revathi V, “Prediction Of Heart Disease Using Back Propagation MLP Algorithm”, International Journal of Scientific and Technology Research, Volume 4, Issue 8, August 2015..
    a year ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VII): 69-75 (August 2020)1. Adepoju, S. A.&AlhassanS. (2010). Challenges of ATM use and fraud occurrences in Nigeria: A case study of selected banks in Minna metropolis. Journal of Online Banking and Business, 15 (2), 1-10. 2. Adeoye, O. (2012). Evaluate the performance of two-factor authentication solutions in the banking sector. International Journal of Computer Science, 9 (4), 457-462. 3. Alblawi, U. Moon I., Kim, J., Suh, S.C. & Lee, W. (2014). A hybrid classifier with classification a binning for network application identification. Journal of Integrated Design and Operations Science, 18 (3), 3-22, 4. Banerjee, U.,Vashishtha, A.&Saxena M. (2010). Wireshark function evaluation as an intrusion detection tool. International Journal of Computer Applications, 6 (7), 1-5. https://Doi:10.5120/1092-1427. 5. Brunner, A., Decressin, J., Hardy, D., &Kudela, B. (2004). The German Banking System of Three Pillars: The European Transnational Perspective. Washington, DC: International Monetary Fund. 6. Chavalone, S. (2012). Banking fraud and ATM security. Retrieved from (Accessed 10th August, 2020) http://resources.infosecinstitute.com/bank-fraud-atm-security/. 7. Cisco Networking Academy. (2017). Basics of steering and switching. Hoboken, New Jersey: Cisco Press, 2017. 8. Debnath, R. Agrawal, B.&Vishnav, C. (2014). DES, AES, and Triple DES: Symmetric Key Cryptography Algorithms. International Journal of Scientific, Engineering and Technical Research, 3 (3), 652-654 9. Firewall. (Nd) Oxford Life Dictionary of the English Language. Retrieved from (Accessed 10th August, 2020) https://en.oxforddictionaries.com/definition/firewall. 10. Hussain, M. S. Russell, A.H.&RobidasL.C. (2015). Review of ATM services in Dhaka City for an analysis of factors affecting customer satisfaction. Journal of Business and Management IOSR, 17 (11) 1, 68-75. 11. Khan, F. (2015). How does an ATM machine work? Retrieved fromwww.quora.com/How-does-an-ATM-machine-work-1 12. Modern Ghana. (2013). Federal prosecutors say hackers stole $ 45 million in ATM card fraud. Retrieved from www.modernghana.com/news/463043/1/hackers-steal-45-million-in-atm-card-scam-Federal.html 13. Regular old phone service. (No date). On Wikipedia. Retrieved from (Accessed 10th August, 2020). https://en.wikipedia.org/wiki/Plain_old_telephone_service 14. Prodromo, A. (2019). TLS Security 6: Examples of TLS Attacks and Attacks. (Accessed 10th August, 2020) Taken from https://www.acunetix.com/blog/articles/tls-vulnerabilities-attacks-final-Part/143-153 15. Pymnts.com. (2017). Automated teller machines in the US have recently grown. Retrieved from https://www.pymnts.com/cash/2017/atmia-says-us-atms-finally-see-growth/(Accessed 10th August, 2020) 16. Robam, A., Verma, and A. And Singh A. (2013). A method for detecting beams using beam sniffing. International Journal of Computer Science and Engineering, 4 (3), 21-33. https://Doi:10.5121/ijcses.2013.4302. 17. Sidel, R. (2015). Debit card data theft from ATMs escalated. Retrieved from www.wsj.com/articles/theft-of-debit-card-data-from-atms-soars-1432078912(Accessed 10th August, 2020). 18. Payment Card Forensic Analysis: From Concept to Desktop and Mobile Analysis Tools. Digital Survey, 11 (3), 143-153. TechTarget Network. (Nada). What is Ethernet? Retrieved from. (Accessed 10th August, 2020). https://searchnetworking.techtarget.com/definition/Ethernet 19. TechTarget Network. (n.d). What is a local area network (LAN)? Retrieved from (Accessed 10th August, 2020)www.searchnetworking.techtarget.com/definition/local-area-network-LAN 20. Twum, F., Nti, IK, & Asante, M. (2016). Use multi-factor authentication to improve ATM security. International Journal of Science and Engineering Applications, 5 (3), 126-134. https://Doi:10.7753/ijsea0503.1003. 21. Wireshark. (No date). In Techopedia. Retrieved from www.techopedia.com/definition/25325/wireshark (Accessed 10th August, 2020) 22. Young, C. (2019). Introduce ZOMBIES POODLE and GOLDENDOODLE. Retrieved from https: (Accessed 10th August, 2020) //www.tripwire.com/zh-CN/state-of-security/vulnerability-management/zombie- 23. Zou Lin, Liao Ming, Yuan Cheng, Zhang Hai (2017). Use the expected packet size to detect low-speed DDoS attacks. Security and Communications Network, 2017 (1), 1-14. https://Doi:10.1155/2017/3691629.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VI): 53-57 (June 2020)1. M. A. Rafique, W. Pedrycz, and M. Jeon, “Vehicle license plate detection using region-based convolutional neural networks,” Soft Computing,2018, Vol. 22, No. 19, pp. 6429-6440. 2. Y. N. Chen, C. C. Han, G. F. Ho, and K. C. Fan, “Facial/License Plate Detection Using a Two-level Cascade Classifier and a Single Convolutional Feature Map,” International Journal of Advanced Robotic Systems, 2015, Vol. 12, No. 12, pp. 183-198. 3. C. Gerber, and M. Chung, “Number Plate Detection with a Multi- Convolutional Neural Network Approach with Optical Character Recognition for Mobile Devices,” Journal of Information Processing Systems, 2016, Vol. 12, No. 1, pp. 100-108. 4. Y. Yuan, W. Zou, Y. Zhao, X. Wang, X. Hu, and N. Komodakis, “A Robust and Efficient Approach to License Plate Detection,” IEEE Transactions on Image Processing, 2017, Vol. 26, No. 3, pp. 1102-1114. 5. W. Zhou, H. Li, Y. Lu, and Q. Tian, “Principal Visual Word Discovery for Automatic License Plate Detection,” IEEE Transactions on Image Processing, 2012, Vol. 21, No. 9, pp. 4269-4279. 6. B. Li, B. Tian, Y. Li, and D. Wen, “Component-Based License Plate Detection Using Conditional Random Field Model,” IEEE Transactions on Intelligent Transportation Systems, 2013, vol. 14, no. 4, pp. 1690-1699. 7. R. F. Prates, G. C. Chavez, W. R. Schwartz, and D. Menotti, “Brazilian License Plate Detection Using Histogram of Oriented Gradients and Sliding Windows,” International Journal of Computer Science & Information Technology, 2013, Vol 5, No 6, pp. 39-52. 8. R. Wang, N. Sang, R. Huang, and Y. Wang, "License plate detection using gradient information and cascade detectors,” Optik, 2014, Vol. 125, No. 1, pp. 186-190. 9. A. M. Ghaili, S. Mashohor, A. R. Ramli, and A. Ismail, “Vertical-Edge-Based Car-License-Plate Detection Method,” IEEE Transactions on Vehicular Technology, 2013, vol. 62, no. 1, pp. 26-38. 10. J. Tian, G. Wang, J. Liu, and Y. Xia, “License plate detection in an open environment by density-based boundary clustering,” Journal of Electronic Imaging, 2017, Vol. 26. No. 3, PP. 330171-3301711. 11. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: License plate-recognition from still images and video sequences: A survey. IEEE Trans. Intell. Transp. Syst. 9(3), 377–391 (2008) 12. Jia, W., Zhang, H., He, X.: Region-based License Plate Detection. J. Network and comput. Applications 30(4), 1324–1333 (2007) 13. Wang, S., Lee, H.-J.: A cascade framework for a real-time statistical plate recognition system. IEEE Trans. Inf. Forensics Security 2(2), 267–282 (2007) 14. Anagnostopoulos, C., Anagnostopoulos, I., Loumos, V., Kayafas, E.: A License Plate-Recognition Algorithm for Intelligent Transportation System Applications. IEEE Trans. Intell. Transp. Syst. 7(3), 377–392 (2006) 15. Zheng, D., Zhao, Y., Wang, J.: An Efficient Method of License Plate Location. Pattern Recognit. Lett. 26(15), 2431–2438 (2005) 16. Chang, S., Chen, L.-S., Chung, Y.-C., Chen, S.-W.: Automatic License Plate Recognition. IEEE Trans. Intell. Transp. Syst. 5(1), 42–53 (2004) 17. Deb, K., Chae, H.-U., Jo, K.-H.: Parallelogram and Histogram based Vehicle License Plate Detection. In: IEEE ICSMA, pp. 349–353. IEEE Press, New York (2008).
    4 years ago by @ijiris
    (1)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 102-107 (May 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..
    5 years ago by @ijiris
    (0)
     
     
  • ⟨⟨
  • 1
  • ⟩⟩