Volume 7 Issue 9
Author's Name: Jushak Prodhan, Ibu Fatah, Yusfir Rumi
Abstract—Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication, and data origin authentication. Most cryptographic algorithms function more efficiently when implemented in hardware than in software running on single processor. However, systems that use hardware implementations have significant drawbacks: they are unable to respond to flaws discovered in the implemented algorithm or to changes in standards. As an alternative, it is possible to implement cryptographic algorithms in software running on multiple processors. However, most of the cryptographic algorithms like DES (Data Encryption Standard) or 3DES have some drawbacks when implemented in software: DES is no longer secure as computers get more powerful while 3DES is relatively sluggish in software. AES (Advanced Encryption Standard), which is rapidly being adopted worldwide, provides a better combination of performance and enhanced network security than DES or 3DES by being computationally more efficient than these earlier standards. Furthermore, by supporting large key sizes of 128, 192, and 256 bits, AES offers higher security against brute-force attacks.
Author's Name: Aswaidi dhani, Danael Sam, Gahamisi gele
Abstract—Images are undoubtedly the most efficacious and easiest means of communicating an idea. They are surely an indispensable part of human life .The trend of sharing images of various kinds for example typical technical figures, modern exceptional masterpiece from an artist, photos from the recent picnic to hill station etc, on the internet is spreading like a viral. There is a mandatory requirement for checking the privacy and security of our personal digital images before making them public via the internet. There is always a threat of our original images being illegally reproduced or distributed elsewhere. To prevent the misuse and protect the copyrights, an efficient solution has been given that can withstand many attacks. This paper aims at encoding of the host image prior to watermark embedding for enhancing the security. The fast and effective full counter propagation neural network helps in the successful watermark embedding without deteriorating the image perception. Earlier techniques embedded the watermark in the image itself but is has been observed that synapses of neural network provide a better platform for reducing the distortion and increasing the message capacity.
Author's Name: Rirtan Singh kumar, Manish Rathod
Abstract—Speech signal is modelled using the average energy of the signal in the zerocrossing intervals. Variation of these energies in the zerocrossing interval of the signal is studied and the distribution of this parameter through out the signal is evaluated. It is observed that the distribution patterns are similar for repeated utterances of the same vowels and varies from vowel to vowel. Credibility of the proposed parameter is verified over five Malayalam (one of the most popular Indian language) vowels using multilayer feed forward artificial neural network based recognition system. The performance of the system using additive white Gaussian noise corrupted speech is also studied for different SNR levels. From the experimental results it is evident that the average energy information in the zerocrossing intervals and its distributions can be effectively utilised for vowel phone classification and recognition.
Author's Name: ChitraSnekha trivedi, Ashish Garg
Abstract—Companies are doing marketing or branding of their products and services using digital media. Life is becoming so smooth and transparent by the sharing of information through the digital mediums. Whether it is a small or a big company, everybody is running for the competition, because they want to lock their customers. In this paper current market scenario is included with respect to cloud computing solution. Data access at present has limitations. Government data which is publicly accessible should have some policy. Cloud Computing is likely to be one of the key pillars on which various e-Governance services would ride. Digital India is a program to prepare India for a knowledge future. Digital India should have policy wherein the Government will be providing information and services to internal and external stakeholders. Cloud computing has become the most stimulating development and delivery alternative in the new millennium. A lot of departments are showing interest to adopt Cloud technology, but awareness on Cloud security needs to be increased. The adoption of Cloud is helping organizations innovate, do things faster, become more agile and enhance their revenue stream. In this paper, the information regarding cloud services and models are provided. Also, the main focus is on what government can do with the help of it for Digital India mission?
Author's Name: Deepti nikil, Dusrat Maahanwal
Abstract—Due to the arrival of new technologies, devices, and communication means, the amount of data produced by mankind is growing rapidly every year. This gives rise to the era of big data. The term big data comes with the new challenges to input, process and output the data. The paper focuses on limitation of traditional approach to manage the data and the components that are useful in handling big data. One of the approaches used in processing big data is Hadoop framework, the paper presents the major components of the framework and working process within the framework.
Author's Name: Vivek Sahadevan, Mitu Joseph
Abstract—This paper gives complete guidelines on BigData, Different Views of BigData, etc.How the BigData is useful to us and what are the factors affecting BigData all the things are covered under this paper. The paper also contains the BigData Machine learning techniques and how the Hadoop comes into the picture. It also contains the what is importance of BigData security. The paper mostly covers all the main point that affect Big Data and Machine Learning.
Author's Name: Saubina Ialik, Krishna
Abstract—In today's world, data is generated at a very rapid speed and final destination of such data is database. Data is stored in database for easy and efficient way to manage these data. All the operations of data manipulation and maintenance are done using Database Management System. Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. A secure database is the one which is reciprocated from different possible database attacks. Security models are required to develop for databases. These models are different in many aspects as they are dealing with different issues of the database security. They may different also because of they are taking different assumptions about what constitutes a secure database. So, it becomes very difficult for database security seekers to select appropriate model for securing their database. In this paper, we have discussed some of the attacks that can be possible with its counter measures and its control methods that can be possible. Securing database is important approach for the planning of explicit and directive based database security requirements. Ensuring security for database is very critical issues for the companies. As complexity of database increases, we may tend to have more complex security issues of database
Author's Name: Juhaeri, Ali Maddinsyah, Sewaka
Abstract—In this paper, a new modified system for equal power division is implemented with the help of rectangular micro strip patch antenna, Gysel power divider and leakage cancellation circuit. Today’s world power division plays an important role in wireless application areas such as base stations, antenna arrays, hand held devices etc., Here micro strip patch antenna is implemented with FR4 as a substrate material due to its benefits such as low loss and low fabrication cost while the ground material is aluminium due to its conductivity. For a good system, the return loss should be highly desirable and insertion loss should be low. Our proposed system is designed with a combination of micro strip patch antenna, leakage cancellation circuit and Gysel power divider produces equal power division with low loss such as insertion loss is measured as -39.291dB, return loss as -16.11dB and leakage cancellation as 6dB which was designed and simulated in Agilent Advanced Design System software (2009).
Author's Name: Saroja Gajendran, Naamasivam
Abstract—Soft Computing techniques are fast growing technology used for problem solving, Information security is of essence factor in the age of computer world. Protecting information, systems and resources from unauthorized use, duplication, modification ,adjustment or any kind of cause which damage the resources such that it cannot be repaired or no longer exist to the real user is one of the part of soft computing. Researcher proposed several mechanism to fight against cyber attacks. Several existing techniques available intrusion detection systems are responsible to face upcoming cyber attacks. Soft computing is one of the best presently using techniques which is applied in Intrusion Detection System to manage network traffic and use to detect cyber attacks with increased efficiency and accuracy.
Author's Name: Aamin Ridibeh, Misaddy Hoche
Abstract—This paper Radon Transformation is generally used to construct optical image (like CT image) from the projection data in biomedical imaging. In this paper, the concept of Radon Transformation is implemented to reconstruct Electrical Impedance Topographic Image (conductivity or resistivity distribution) of a circular subject. A parallel resistance model of a subject is proposed for Electrical Impedance Topography(EIT) or Magnetic Induction Tomography(MIT). A circular subject with embedded circular objects is segmented into equal width slices from different angles. For each angle, Conductance and Conductivity of each slice is calculated and stored in an array. A back projection method is used to generate a two-dimensional image from one-dimensional projections. As a back projection method, Inverse Radon Transformation is applied on the calculated conductance and conductivity to reconstruct two dimensional images. These images are compared to the target image. In the time of image reconstruction, different filters are used and these images are compared with each other and target image.
Author's Name: Raja Pushpa, Vijaya Palani
Abstract—This paper As we all know, in the current era, Internet of Things (IOT) word is very booming in technological market and everyone is talking about the term Smart city especially in India and with reference to keyword smart city, IOT comes with it. The Small word IOT but very big responsibility comes on the shoulders of the technical person to Play with it and extract the data from the IOT . IoT its connecting the multiple things this interconnection is in between living as well as non living things and in that communication huge amount of data is generated so tools and technique which are used for knowledge discover we discuss in this paper . Internet of Things (IOT) and knowledge discovery are the two sides of the coin and both go together. In the absence of one, there is no use of other. This Paper also focuses on types of the data and data generative sources, Knowledge discovery from that data, tools which are useful for the discovery of the knowledge. Technique, which are to be followed for the purpose of discovering meaningful data from the huge amount of data and its impact.
Author's Name: Kalai Vasanth, Subramaniya Karthik
Abstract—Advent of smart phones has brought with it revolution in mobile applications that are available for everyday functions. In this paper we review security requirements for apps from different domains that are communicating sensitive information over insecure network. Some of these apps are already available and some are expected to be introduced in future. We find that there are many parameters that affect security of apps but some are prominent compared to others based on domain of the app. Based on analysis of security requirements we determine the application domain most suitable for implementation of our proposed protocol.
Author's Name: Umar Riyazi, Vikram Singh, Swapna Rahil
Abstract—The user generated content on the web grows rapidly in this emergent information age. The evolutionary changes in technology make use of such information to capture only the user’s essence and finally the useful information are exposed to information seekers. Most of the existing research on text information processing, focuses in the factual domain rather than the opinion domain. In this paper we detect online hotspot forums by computing sentiment analysis for text data available in each forum. This approach analyses the forum text data and computes value for each word of text. The proposed approach combines K-means clustering and Support Vector Machine with PSO (SVM-PSO) classification algorithm that can be used to group the forums into two clusters forming hotspot forums and non-hotspot forums within the current time span. The proposed system accuracy is compared with the other classification algorithms such as Naïve Bayes, Decision tree and SVM. The experiment helps to identify that K-means and SVM-PSO together achieve highly consistent results.
Author's Name: Riya Sharma and Makesh Singh
Abstract—In the view of massive content explosion in World Wide Web through diverse sources, it has become mandatory to have content filtering tools. The filtering of contents of the web pages holds greater significance in cases of access by minor-age people. The traditional web page blocking systems goes by the Boolean methodology of either displaying the full page or blocking it completely. With the increased dynamism in the web pages, it has become a common phenomenon that different portions of the web page holds different types of content at different time instances. This paper proposes a model to block the contents at a fine-grained level i.e. instead of completely blocking the page it would be efficient to block only those segments which holds the contents to be blocked. The advantages of this method over the traditional methods are fine-graining level of blocking and automatic identification of portions of the page to be blocked. The experiments conducted on the proposed model indicate 88% of accuracy in filtering out the segments.
Author's Name: Feriae Boubi, Anja Habacha
Abstract— This Mobile device has become essential part of human life. Apart from call and receive functions, user can access many function in his/her mobile. A user wants everything on his/her mobile device for the ease of work. Some people use tablets instead of laptop or desktop. In this paper, insights into Mobile Cloud Computing (MCC) are presented. First overview of cloud computing system is discussed. Then after architecture of MCC is presented. Some applications based on MCC are also discussed and paper is concluded by exploring the problems and solutions of these in MCC.