Volume-7 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Secure e-health insurance model |
| Country | : | India |
| Authors | : | G.V. Ramesh Babu, Prof. M. Padmavathamma |
| : | 10.9790/0661-0760103 ![]() |
|
[1] "New variant M. J2 – RSA Cryptosystem" : E. Madhusudhan Reddy, B. H. Nagaraiasri, A. B. Rajesh kumar, M. Padmavathamma.
[2] "Threshold Extended ID3 algorithm", A.B. Rajesh Kumar, C. Pani Ramesh, E. Madhusudhan, M. Padmavathamma, ICDIP 2012
International Conference in Malasia.
[3] "A cryptographic key management solution for HIPAA privacy/ security regulations: Wei – Bin Lee, Member, IEEE, and Chien –
Ding Lee, IEEE transaction on information technology in biomedicine, vol 12, No.1, January 2008.
[4] Image encryption using block – based transformation algorithm:Mohammad Ali Bani Younes and Aman Jantan IAENG international
journal of computer science, 35: 1, IJCS _35_1_03.
[5] Design and implementation of a smart card based healthcare information system: Geylani Karda, E. Turhan Tunali* Computer
methods and programs in biomedicine 8I(2006) 66-78.
[6] A novel encryption method for image security: Mohammed Abbas Fadhil A1- Husainy, internation journal of security and its
applications Vol. 6 No. 1 January, 2012.
[7] "Secure E-Health Care Model" IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume X,
Issue X (Sep-Oct. 2012), PP 00-00
[8] Rule-based Expert System for Diagnosis and Symptom of Neurological Disorders "Neurologist Expert System (NES)" ICCIT 2012.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Naïve Bayes classifier, Privacy preserving, Probability, Un-trusted Third Party (UTP).
[1] B. Pinkas, Cryptographic techniques for privacy-preserving data mining, ACM SIGKDD Explorations Newsletter, 4(2), 2006, 12-
19.
[2] C. C. Aggarwal, P. S. Yu., Privacy-Preserving Data Mining:Models and Algorithms(London, Kluwer Academic Publishers
Boston).
[3] J. Han, M. Kamber, Data Mining: Concepts and Techniques(India, Elsevier).
[4] M. Kantarcioglu and J. Vaidya, Privacy preserving naive Bayes classifier for horizontally partitioned data, In IEEE ICDM
Workshop on Privacy Preserving Data Mining, Melbourne, FL, November 2003, 3-9.
[5] J. Vaidya and C. Clifton, Privacy preserving naive Bayes classifier on vertically partitioned data, Proc. SIAM International
Conference on Data Mining, Lake Buena Vista, Florida, April 2004, 22-24.
[6] Z. Yang and R. Wright, Privacy-Preserving Computation of Bayesian Networks on Vertically Partitioned Data, IEEE Transactions
on Data Knowledge Engineering, 18(9), April 2006, 1253-1264.
[7] V. Verykios, E. Bertino, State-of-the-art in Privacy preserving Data Mining, SIGMOD Record, 33(1), 2004, 50-57.
[8] R. Agrawal, R. Srikant Privacy preserving data mining, Proc. of the ACM SIGMOD on Management of data, Dallas, TX USA, May
15-18, 2000, 439-450.
[9] A. C. Yao, Protocols for secure computation, Proc. of 23rd IEEE Symposium on Foundations of Computer Science (FOCS), 1982,
160-164.
[10] W. Du, Mikhail J. Attalah, Secure multi-problem computation problems and their applications: A review and open problems, Tech.
Report CERIAS Tech Report 2001-51, Center for Education and Research in Information Assurance and Security and Department of
Computer Sciences, Purdue University, West Lafayette, IN 47906, 2001.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Content Based Image Retrieval, homogeneity feature, High level feature, Image Segmentation, kmean algorithm, Low level feature.
[1] Wang Xiaoling and Xie Kanglin, "Content based Image retrieval incorporating the AHP method", International Journal of
Information Technology, Vol.11, No.1, pp.25-37,
[2] Irfan and Sumari, "Automated content based image retrieval using wavelets", International Journal of Computational Intelligence,
Vol.1, No.1, pp.1-12, 2004
[3] Chi-Man Pun and Chan-Fong Wong, "Content-Based Image Retrieval Using Rectangular Segmentation", International Journal of
Computers, Vol.2, No.1, pp.72-79, 2008
[4] Hiremath and Jagadeesh Pujari, "Content based image Retrieval based on color, texture and shape features using image and its
complement", International Journal of Computer science and security, Vol.1, No.4, pp.25-35
[5] Arun and Hema P Menon, "Content Based Medical Image Retrieval by Combining Rotation Invariant Contourlet Features and
Fourier Descriptors", International Journal of Recent Trends in Engineering, Vol.2, No.2, pp., November 2009
[6] Srinivasa Rao, Srinivas Kumar and Chandra Mohan, "Content Based Image Retrieval using Exact Legendre moments and support
vector machine", The International Journal of Multimedia & its Applications (IJMA), Vol.2, No.2, pp. 69-79,May 2010
[7] Jalil Abbas, Salman Qadri, Muhammad Idrees, Sarfraz Awan and Naeem Akhtar Khan, "Frame Work for Content Based Image
Retrieval(Textual Based) System", Journal of American Science, Vol.6, No.9,pp.704-707, 2010
[8] Christopher C.Yang, "Content based image retrieval: a comparison between query by example and image browsing map
approaches", Journal of Information Sciences, Vol.30, No.3, pp.254-267, 2004
[9] Rajshree S.Dubey, Rajnish Choubey and Joy Bhattacharjee, "Multi Feature Content Based Image Retrieval", International Journal
on Computer Science and Engineering, Vol.2, No.6, pp.2145-2149, 2010
[10] Nandagopalan, Adiga and Deepak, "A Universal Model for Content-Based Image Retrieval", WASET, Vol.46, No.112, pp.644-647,
2008
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Magnetic Resonance Imaging(MRI), Left Ventricle(LV), Principal Component Analysis(PCA), Active Appearance Model(AAM).
[1] Neeti Gore. "Image Segmentation Combining Level Sets and Principal Component Analysis" A Thesis. Department of Electrical
and Computer Engineering, Carnegie Mellon University.
[2] Caroline Petitjean, Jean-Nicolas Dacher. "A review of segmentation methods in short axis cardiac MR images" Science Direct
Medical Image Analysis.
[3] Andy Tsai*, Anthony Yezzi, Jr., William Wells, Clare Tempany, Dewey Tucker, Ayres Fan, W. Eric Grimson, and Alan Willsky.
"A Shape-Based Approach to the Segmentation of Medical Imagery Using Level Sets" in IEEE Transactions on Medical Imaging,
Vol. 22, No. 2, pp. 137-154 February 2003
[4] Avan Suinesiaputra, Alejandro F. Frangi, A. M. Kaandorp, Hildo J. Lamb, Jeroen J. Bax, Johan H. C. Reiber, and Boudewijn P. F.
Lelieveldt. "Automated Detection of Regional Wall Motion Abnormalities Based on a Statistical Model Applied to Multislice
Short-Axis Cardiac MR Images" in IEEE Transactions on Medical Imaging,, Vol. 28, No. 4, pp. 595-607, April 2009
[5] Timothy F. Cootes and Christopher J. Taylor. A mixture model for representing shape variation. Image and Vision Computing, Vol.
17, No.8, pp. 567–573, 1999.
[6] Timothy F. Cootes, Gareth J. Edwards, and Christopher J. Taylor. A comparative evaluation of active appearance model algorithms.
In Proceedings of the British Machine Vision Conference (BMVC), vol. 2, pp 484–498, 1998.
[7] T. F. Cootes, G. J. Edwards, and C. J. Taylor. Active appearance models. IEEE Transactions on Pattern Analysis and Machine
Intelligence, Vol.23, No(6): pp 681-685, June 2001.
[8] G. J. Edwards, C. J. Taylor, and T. F. Cootes. Interpreting face images using active appearance models. In Proc. International
Conference on Automatic Face and Gesture Recognition, pp 300-305, June 1998.
[9] T. Cootes, G. Edwards, and C. Taylor. Active appearance models. In Proceedings of the European Conference on Computer Vision,
volume 2, pages 484-498, 1998.
[10] G. J. Edwards. Learning to Identify Faces in Images and Video Sequences. PhD thesis, University of Manchester, Division of
Imaging Science and Biomedical Engineering, 1999.
