Title |
QUADRATIC NUAT Bâ€SPLINE CURVES WITH MULTIPLE SHAPE PARAMETERS |
| Int J Mach Intell Vol:3 Iss:1 (2011-06-01) : 18-24 |
Authors |
MRIDULA DUBE, REENU SHARMA |
Published on |
01 Jun 2011 Pages : 18-24 Article Id : BIA0000964 Views : 1127 Downloads : 1182 |
DOI | http://dx.doi.org/10.9735/0975-2927.3.1.18-24 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access |
In this paper a new kind of splines, called quadratic nonâ€uniform algebraic trigonometric Bâ€splines (quadratic NUAT Bâ€splines) with multiple shape parameters are constructed over the space spanned by { }. As each piece of the curves is generated by three consecutive control points, they possess many properties of the quadratic Bâ€spline curves and quadratic trigonometric Bâ€spline curves. These curves have continuity with nonâ€uniform knot vector. These curves are closer to the control polygon than the quadratic Bâ€spline curves and quadratic trigonometric Bâ€spline curves when choosing special shape parameters. The shape parameters serve to local control in the curves. The changes of one shape parameter will only affect two curve segments. Taking different values of the shape parameters, one can globally or locally adjust the shapes of the curves. The generation of tensor product surfaces by these new splines is straightforward.
|
|
Title |
ATTACK VECTORS USED IN FRAUDULENCE CONNECTION DURING ONLINE TRANSACTIONS |
| Int J Mach Intell Vol:3 Iss:1 (2011-06-08) : 25-30 |
Authors |
PRADEEP PUNDIR, VIRENDRA GOMANSE |
Published on |
08 Jun 2011 Pages : 25-30 Article Id : BIA0000965 Views : 1220 Downloads : 1439 |
DOI | http://dx.doi.org/10.9735/0975-2927.3.1.25-30 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access |
In today’s digital world new technologies are designed for customers. Once this technology becomes a comfort there are risk associated. Online fraud is one of the high risks that are targeting customers, organizations and any individual who wants to be associated with ecommerce transactions. Self Propagating Codes are targeting Personal Identifiable Information of customers during authentication or authorization of any transaction. In this paper emphasis has been given on possible online frauds such as Phishing, Carding and BIN attacks. What are the different attack vectors associated to online frauds and what precautions need to be taken is also briefed in the current article.
|
|
Title |
VISUAL DATA MINING USING UNSUPERVISED CLASSIFICATION OF LULC SATELLITE IMAGERY |
| Int J Mach Intell Vol:3 Iss:1 (2011-06-13) : 31-35 |
Authors |
KODGE B.G., HIREMATH P.S. |
Published on |
13 Jun 2011 Pages : 31-35 Article Id : BIA0000966 Views : 1129 Downloads : 1090 |
DOI | http://dx.doi.org/10.9735/0975-2927.3.1.31-35 |
|
Abstract |
Full Text |
PDF | XML |
PubMed XML |
CNKI |
Cited By |
Open Access |
This study presents a new visualization tool using unsupervised classification of LUCL satellite imagery. Visualization of feature space allows exploration of patterns in the image data and insight into the classification process and related uncertainty. Visual Data Mining provides added value to image classifications as the user can be involved in the classification process providing increased confidence in and understanding of the results. In this study, we present a prototype visualization tool for visual data mining (VDM) of satellite imagery into volume visualization. This volume based representation divides feature space into cubes or voxels. The visualization tool is showcased in an unsupervised classification study of high-resolution imageries of Latur district in Maharashtra state of India.
|