Attribute Based Access Control (ABAC) models are designed with the intention to overcome the shortcomings of classical access control models (DAC, MAC and RBAC) and unifying their advantages. In ABAC, the access control is provided based on generic attributes of entities. Many organizational security policies condition access decisions on attributes. OWL… (More)
This paper presents a comparable study of different adaptive filter algorithm LMS, NLMS, RLS and QR-RLS applied in minimization of MSE. In this paper we considered two kinds of scenarios for analyzing their performance. The RLS algorithm has faster convergence speed/rate than LMS algorithms with better robustness to changeable environment and better… (More)
According to recent media reports, there has been a surge in the number of devices that are being connected to the Internet. The Internet of Things (IoT), also referred to as Cyber-Physical Systems, is a collection of physical entities with computational and communication capabilities. The storage and computing power of these devices is often limited and… (More)
The FP-tree algorithm is one of the fastest techniques for generating frequent item set for association rule mining. Extracting frequent item set and generating association rules are two major challenges in a large student admission database. The same is tried to present in this paper with the help of sample data set.
Image segmentation form an important preliminary step in many high level image processing and computer vision applications. Its importance necessitates the quantitative evaluation of image segmentation results. A few methods have been developed, based on the general principals. In this paper, we propose a novel segmentation evaluation method based on region… (More)