Skip to main content

Showing 1–2 of 2 results for author: D, A K

Searching in archive cs. Search in all archives.
.
  1. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

    Authors: Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B

    Abstract: With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  2. arXiv:1710.09267  [pdf

    cs.CY

    Automated Region Masking Of Latent Overlapped Fingerprints

    Authors: Tejas K, Swathi C, Aravind Kumar D, Rajesh Muthu

    Abstract: Fingerprints have grown to be the most robust and efficient means of biometric identification. Latent fingerprints are commonly found at crime scenes. They are also of the overlapped kind making it harder for identification and thus the separation of overlapped fingerprints has been a conundrum to surpass. The usage of dedicated software has resulted in a manual approach to region masking of the t… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: Accepted and presented in I-PACT international IEEE conference on 21st and 22nd April