Learn More
In bioinformatics, the discovery of transcription factor binding affinities is important. This is done by sequence analysis of micro array data. The determination of continuous and gapped motifs accurately from the given long sequence of data, say genetic data is challenging and requires a detailed study. In this paper, we propose an algorithm that can be(More)
The Internet is a ubiquitous and affordable communications network suited for e -commerce and medical image communications. Security has become a major issue as data communication channels can be intruded by intruders during transmission. Though, different methods have been proposed and used to protect the transmission of data from illegal and unauthorized(More)
The authentication of people using Iris based recognition system is the most reliable biometric traits due to its stability, invariant and distinctive features for personal identification. Iris recognition consists of localization of the Iris region, extracting Iris features, generation of data set of Iris images and then Iris pattern recognition. This(More)
Feature selection aims to select subset of original features. It removes unrelated, redundant or noisy data from the problem domain. Rough set theory is often applied to feature reduction using the data alone, requiring no additional information and widely used for classification tool in data mining. Clustering, a form of data grouping, groups a set of data(More)
Iris recognition is the most accurate means of personnel identification due to the uniqueness of the patterns contained in each iris. The proposed technique uses the principle of the method proposed by Masek [4] to normalize the iris region. Libor Masek used a rectangular representation of the iris generated from a uniform selection of points along the(More)
Secure transmission of message was the concern of early men. Several techniques have been developed ever since to assure that the message is understandable only by the sender and the receiver while it would be meaningless to others. In this century, cryptography has gained much significance. This paper proposes a scheme to generate a Dynamic Key-dependent(More)
Feature selection is a fundamental problem in data mining, especially for high level dimensional datasets. Feature selection is a process commonly used in machine learning, wherein subsets of the features from the original set of features are selected for application of a learning algorithm. The best subset contains the minimum number of dimensions(More)
With the rapidly changing technological realm, modern healthcare management systems need to change to accommodate these new advances. There is an urgent need to provide and protect the confidentiality of health care records when stored in common databases and transmitted over public insecure channel. This paper outlines DNA sequence based cryptography which(More)