Various studies on consumer purchasing behaviors have been presented and used in real problems. Data mining techniques are expected to be a more effective tool for analyzing consumer behaviors. However, the data mining method has disadvantages as well as advantages. Therefore, it is important to select appropriate techniques to mine databases. The objective of this paper is to know consumer behavior, his psychological condition at the time of purchase and how suitable data mining method apply to improve conventional method.Moreover, in an experiment, association rule is employed to mine rules for trusted customers using sales data in a super market industry
Darrieus wind turbines are simple lift based machines with exceptionally high efficiencies in terms of power coefficient compared to similar drag based vertical axis turbines. However, in low Reynolds numbers, a notable performance loss was reported. As a potential solution, truncated NACA
Concerns of privacy, template security and efficiency of biometric authentication systems have received considerable research attention in the recent past. Binary template representations have been shown to provide significant improvements in efficiency without compromising accuracy for a variety of biometric modalities including fingerprints, palmprints and iris. Most of the secure authentication protocols work with generic feature representations or propose new secure templates for specific modalities. In this work, we propose an authentication protocol that works with any binary biometric representation that employs hamming distance for comparison and convert it into a secure, privacy preserving protocol that provides template protection. We also provide the ability to use masks while computing the hamming distance. The protocol retains the accuracy of the underlying representation as demonstrated by our experiments.
Modern biometric technologies claim to provide alternative solution to traditional authentication processes. Even though there are various advantages of biometric process, it is vulnerable to attacks which can decline it"s security. Different schemes are proposed to protect from different attacks. This paper presents biometric process, attacks on biometric process, study of different protection techniques used to protect against different attacks. The authors have designed protection model of biohashing technique using Session key. This key is generated using Chaos phenomenon.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.