2019
Vol 4, No 2 (2019): An Image Retrieval Processing using CBIR System
Authors: Manish Jain, Avnesh Kumar Joshi
Abstract: CBIR system that works on the basis of low level image semantics cannot be directly related to the expressive semantics that is used by human for deciding image similarities. The low-level semantic of the image consists of color, texture and shape of the object inside an image. Now- a- day, one type of feature extraction technique cannot provide the fulfilled result because in the latest trained used the combination of feature techniques. There is generous increase in retrieval precision when combinations of these techniques are used in an effective way. In this paper, propose a comparison on CBIR system using different feature extraction methods; three features based on color( i.e HSV Histogram, Color Moment) and another two feature computed by applying the texture feature using Gabor Wavelet and Wavelet Transform of the image. For similarity matching between the query image and database images Manhattan distance or City Block or L1 distance is used. The experimental results on WANG database showed higher retrieval efficiency (in terms of precision) when compared with existing methods using color and texture features.
Vol 4, No 2 (2019): Online FDS
Authors: Surwase Aishwarya, Tambe Prasad, Salave Tushar, Shinde Mayur
Abstract: The online food delivery system is one of the fastest growing marketing strategies for food and hotel industries to gain more profits. Food is a basic need for every human, major business and industries. It is difficult for business professional, students to get fresh food available on daily basis due to the workplace busy schedule. So to make good food available at ones doorstep we started a online food delivery service through a very reliable and secured android FDS application. FDS have a multi-vendor system with user friendly dashboard. FDS has the most famous vendors in the city and a wide variety of food items. A user can order his/her favorite food following easy steps. He/she can choose the vendor of his/ her choice and go through all the food items it provides. He/she then, can select the food items and place the order. Now he/she has to proceed to payment. People can enjoy their favorite food without ever leaving sofa. Thus FDS designed to save the time of waiting at vendor location; user can order the food in advance by our app.
Vol 4, No 2 (2019): Study on Attacks and Security Schemes in Vehicular Ad-hoc Network
Authors: Madan Pachori, Satish Singh Mekale
Abstract: The thought of VANETs is moderately simple: by incorporating the wireless communication and information sharing capabilities, the vehicles are often visited a network providing similar services just like the ones with which we are used to in our offices or homes. Several sudden black things are encountered on road networks daily, many of which may lead to congestion and safety hazards. VANETs are eminent from different kinds of Ad-hoc networks by their hybrid network architectures, node movement characteristics, and new application scenarios. Many traffic signals are used to reduce accidents in the roads, but since it is not much effective. Hence VANET is used Road Side Unit (RSU). This RSU connects to the internet, and provides information to the Vehicular Ad Hoc Network users. Each and every vehicle is interconnected to each other hence it can send alert message to another vehicle to reduce the speed or increase the speed to avoid accidents. Each and every vehicle can use internet facility while traveling. The information transferred between vehicle and RSU is more secure, because the road side unit provides unique key for each and every user connected to it. VANET is used to provide safety and efficiency in transportation system. The service provided by the road side unit is called Service-Oriented Vehicular Ad Hoc Network. Security is that the most vital concern in VANET because of open access medium. VANETs are being employed to enhance road safety and alter a large sort of added services. Therefore, VANETs cause several distinctive networking analysis challenges, and the design of an efficient routing protocol for VANETs is very crucial. Security and privacy are indispensable in transport communications for productive acceptance and readying of such a technology. The transport safety application ought to be completely tested before it’s deployed during a universe to use. Simulator tool has been most well-liked over outside experiment as a result of it straightforward, easy and cheap. VANET needs that a traffic and network machine ought to be used along to perform this check. Security theme, antecedently projected during this paper within the presence offender undoubtedly of attacker definitely improves the performance of VANET. The study of different security schemes are provides the suggestion about to propose a new security scheme to secure VANET.
Vol 4, No 2 (2019): Survey on - Web Application Attack Detection using Data Mining Techniques
Authors:-Meghana C, Chaitra B, Nagaveni V
Abstract:-Web applications are computer codes which permit website users to access data from database using Internet. Intruders gain direct access to these databases due to some of the vulnerabilities in the website and this is known as web application attack. Their main motive is to corrupt the available sensitive data. Several measures have taken to address these attacks using various technologies and one of the biggest challenges is to respond for latest and unknown attacks in productive way. The main objective of this paper is to explore various techniques which include firewalls, [IDS] intrusion detection systems and honey pots to address different types of attacks. Various Data mining techniques provide more effective solutions.
Vol 4, No 1 (2019): A Survey Paper on Active Plant Wall for Green Indoor Climate Based on Cloud Computing and Internet of Things
Authors:-S. S. More, Susmita Pawar, Namrata Kulkarni, Akshata Patil, Shubham Singh, Rahul Patil
Abstract:-Rapid refinement of cloud technologies has allowed the extensive deployment of applications based on cloud and services. Nowadays commercial companies, public organizations, private persons and universities like to migrate their applications, services and data storage to public cloud platforms such as Amazon cloud services, Azure cloud, IBM Bluemix or Google cloud platform. The amalgamation with IoT is an inevitable characteristic of any public cloud platform, due to the arriving IoT era and quick annual growth of connected devices.
Vol 4, No 1 (2019): Employee Performance Appraisal Using Adaptive Neural Fuzzy Inference System (ANFIS)
Authors:Â Zarni Sann, Thi Thi Soe
Abstract: The evaluation discussion is an important element in the work of supervisors or managers and staff administration, and in interaction between individual employees and their supervisors. The appraisal of working activity is especially important for organizations or company, as guaranteeing the quality of their job means assuring not only the professional skills of their staff but also the quality of the working activities. In this paper, we discuss the employees’ performance appraisal using Neuro-Fuzzy System to find out the relationship between the Personal problems and employees’ performance in organization. This System consider the various aspects of performance measures of employees, like Vocational competence, Responsibility at work and activity in the workplace, Personal Abilities, Quality and performance that have deep influence on the staff’s performance in business organizations. The results showed that the employee’s performance level correlated with interaction between individual employees, supervisor, and customer satisfaction.
Vol 4, No 1 (2019): Smart Detection and Intimation of Vehicle Collision
Authors:-Â M. Pradeep, Dr. Chandran K R
Abstract:- Road accidents are being increased day by day which are difficult to eliminate even there are many modern systems available to avoid the vehicle collision. The major recovery part in accident is to rescue the patient who is in emergency. This project is aimed to develop a smart detection and intimation system during the vehicle collision to the nearby registered ambulance immediately. Here the vehicle met with an accident will cause a vibration with high frequency which is captured by a MEMS (Micro-Electro-Mechanical-system) sensor. The vibration captured by the sensor will trigger the user smart phone application. The mobile application which will transfer the user’s current location to the web server is where the number of registered ambulance location is been stored in the database. The system will match the user’s location with the nearby ambulance location and an alert notification is sent to the particular ambulance through smart phone application. Therefore the smart identification and intimation of the accident can be made without any human interface. If this project is implemented in real time will reduce the loss of life due to late rescue of injured patients.
Vol 4, No 1 (2019): Role Based Cascaded Delegation using HCBE in Cloud
Author:-Nirmalrani V
Abstract:-Workflow systems often use delegation to enhance the flexibility of authorization; delegation transfer privileges among users across different administrative domains and facilitates information sharing. In independently verifiable delegation mechanism, delegation credential can be verified without the participation of domain administrators this protocol is called Role-Based Cascaded Delegation (RBCD), supports simple and efficient cross-domain delegation of authority. RBCD enables a role member to create delegations based on the dynamic needs of collaboration; in the meantime, a delegation chain can be verified by anyone without the participation of role administrators. To address this problem, the Measurable Risk Adaptive Decentralized Role-based Delegation framework is used. To describe an efficient realization of RBCD by using aggregate signatures, the authentication information for an arbitrarily long role-based delegation chain is captured by one short signature of constant size. This paper presents a concrete realization of RBCD that gives compact delegation credentials. Traditionally, the number of signatures required for the verification of a delegation chain is linear in the number of entities of the chain. Our implementation needs only one aggregate signature, which is a significant improvement in efficiency over the existing delegation chain protocols. The flexibility of authorization can be enhanced by using delegation in workflow systems.
Â
Vol 4, No 1 (2019): Web Based Industrial Automation System
Authors:Â Shubham D. Jadhav, Divyesh Thakur, Aman S. Shaikh, Vishal Namaanvar, Satish P. Pise
Abstract:Â A company may run a number of projects at a time, and requires input from a number of individuals, or teams for a multi-level development plan, whereby a good management system is needed. Management systems represent a rapidly growing technology in IT industry. As the number of users, who utilize management applications continues to grow, To increase an efficiency of a product, nowadays many industries are using different web based management systems .Thus, a proper management system plays a distinctive part in ensuring reliable, robust and high quality web applications for customers. Developing a web based management system and showing how, in turns, it helps users to handle projects. Nowadays, invoices, which are one of the most important documents exchanged between business partners, should be produced with the intention of disseminating them to a broader range of devices through multiple channels which include web and SMS. Handling invoices, product inventory, customer relations and other business transactions via the internet have been found to be a cost-effective way of accomplishing such tasks. Industry experts predict that communication via internet invoices will enable issuers influence customer behavior in a positive way.
2018
Vol 3, No 3 (2018): A Survey on: Car Accident Detection and Car Health Monitoring Using IOT
Authors:Â D. D. Patil, Tejas Shah, Sunil Konuri, Ajay Kumar Challa, Rohit Rawool
Abstract: Every day around the world, a large percentage of people die from traffic accident injuries. Increase in ‘Road Accidents’ have increased the death rates as well as is one of the biggest problems faced by human in daily transport. With increase in use of ‘Internet of Things’ smart cars and transportation is being developed, the aim of this project is to use IOT to detect the Car Accident and alert the required authority with intensity of accident for emergency cases and also measure the car health with specific parameters. IOT is a domain where every device is connected to each other and to humans. IOT can be used to solve the current problems by getting the sensor data and detection and intimation about the accidents. A large number of people deaths due to car accidents every day. The common reasons are driver’s mistake and late response from emergency services. There is a need to have an effective road accident detection and information communication system in place to save injured persons. A system sends the information to nearby hospital and police station of exact location of accident spot. In research literature, a number of automatic accident detection systems are proposed by numerous researchers. These include accident detection using smartphones, GSM and GPS technologies, vehicular ad-hoc networks and mobile applications. The implementation of an automatic road accident detection and information communication system in every vehicle is very crucial. This paper presents automatic car accident detection techniques and car health monitoring used to save person’s life.
Vol 3, No 3 (2018): Survey on Big Data Visualization Framework for Vehicle Scene Classification
Authors:Â Priyadarshini R, S. Kayalvizhi, A.Geetha
Abstract: In every sphere of life Big Data will be transformative. Data Visualization and Analytics plays important role in decision making in various sectors. It is important to analyze the various information of the vehicle for the collision mitigation. In vehicle for the collision prevention the Sensor’s, Camera information’s are taken and analyzed for the various purposes. It is important to identify various scenes for sensor performance evaluation. Signals in a vehicle are transmitted through CAN (Controller Area Network) buses from Sensor’s, control units and signals for actuators. If the Radar fails to record certain information, the Camera data are analyzed to obtain the result. The paper represents the survey on how to obtain the data from the Radar, CAN and GPS(Global Positioning System) to develop the data visualization framework andusing deep learning analyze the performance of the vehicle data for different scene classification.
Vol 3, No 3 (2018): Survey on IOT Industry Protection System Using Arduino
Authors:-Ashwini, Prateeksha U Shanbhag, Pranitha Preema Crasta, Shreeraksha. P, Prof. Pragathi Hegde
Â
Abstract:-Internet of Things (IoT) plays a key role in the new generation of industrial automation systems (IASs). Evolving IoT standards if effectively used may address many challenges in the development of IASs. However, the use of the IoT and the REST architectural paradigm that IoT is based on is not an easy task for the automation engineer. In this paper, a model driven system engineering process is adopted for IASs and it is extended to exploit IoT standardization efforts in IEC 61131 based system. IoT is considered as an enabling technology for the integration of cyber-physical and cyber components of the system and humans, bringing into the industrial automation domain the benefits of this technology. A UML profile for IoT is exploited to automate the generation process of the IoT wrapper, i.e., the software layer that is required on top of the IEC 61131 cyber part of the cyber physical component to expose its functionality to the modern IoT IAS environment. A prototype implementation and performance measurements prove the feasibility of the presented approach.
Vol 3, No 3 (2018): Block Chain Technology
Authors:Â Aditya Sharmal, Amit Maurya, Akash Shrivastava, Gunjan Chandwani
Abstract: The research paper deals with Bitcoin, its mining, how mining actually works how Bitcoins are made, uses of Bitcoin and why we should use Bitcoin. Digital wallets for storing Bitcoins It also covers some of the biggest issues associated with Bitcoin like a decentralised currency covering the vast problem of double spending in initial days of Bitcoin trading. The uses of Block-chain in Bitcoin’s transaction to solve the problem of double spending of Bitcoin. Applications of Block-chain other than crypto currency like in healthcare sector, real estate, voting, cyber security, supply chain management and Networking and IOT. It also covers sections by which we can make block-chain faster especially while buying crypto currencies and why SSDs should be preferred for Bloch-chain operations.
Vol 3, No 3 (2018): Survey on Data Extraction Using Text Mining
Authors:Â Akshitha Shetty P, Sumana, Sushmitha K Shetty, Ujwala B M, Sadhana.B
Abstract: This paper is focused on data extraction. Nowadays there is an increasing trend in the usage of computers for storing documents as a result of it substantial volume of data is stored in the computers in the form of documents. The documents can be of any form such as structured documents, semi-structured documents and unstructured documents. Retrieving useful information from huge volume of documents is very tedious task. Text mining is an inspiring research area as it tries to discover knowledge from unstructured text. This paper gives an overview of concepts, applications, issues and tools used for text mining. In the last decades explosion of information and communication technologies has led to a whole new scenario concerning people’s accessibility to new job opportunities and companies’ options for employing the right person for the right job. In this work, we present a set of techniques that makes the whole recruitment process more effective. We have implemented a system that models the candidate’s CVs in a Structured Data. Finally, it presents the results to the recruiter based on their criteria. In this case today’s technology is used which basically helps the recruiter to get only the required resumes from the huge slot. The aim is to obtain a CVs from bulk of the CV pool and to extract the min data on particular user defined condition.
Vol 3, No 2 (2018): Multi-Partition Scalable K-Anonymizaiton Using MapReduce
Authors:-P Srinivasa Rao , N Sushma Rani
Abstract:-Preservation of privacy in data mining is an absolute need for exchanging sensitive information in terms of data analysis and publishing. Threats such as internet phishing posed severe threat on widespread sensitive information over the web. There are some widely used privacy preserving data mining techniques such as association rule mining, clustering and classification based privacy preservation, and k-anonymity. A multi-partition scalable k-anonymization (MSKA) approach using MapReduce [1] is proposed in this paper that targets the scalability issue in Privacy Preserving Data Publishing (PPDP). The proposed approach uses Hadoop’s MapReduce to increase the performance and reduce the runtime of the algorithm for anonymizing the data
Vol 3, No 2 (2018): A Specialized and Think about on Moral Hacking Useful
Author:-Dr. I. Lakshmi
Abstract:-The state of security on the internet is very poor. Hacking is a natural summons in which, a person effort the impuissance in a system of rules for self-profit or gratification. As world and buck private administration migrate more of their critical functions or coating such as electronic Department of Commerce , selling and database admission to the Internet, then outlaw have more opportunity and bonus to addition memory access to spiritualist information through the Web application. Thus the need of protecting the organization from the hacking generated by the cyber-terrorist is to promote the persons who will punch binding the illegal attacks on our computer systems. Ethical hacking is an identical bodily function which intention to breakthrough and rectifies the weakness and vulnerabilities in a system. Ethical hacking describes the process of hacking a network in an ethical way, therefore with good intentions. This newspaper publisher describes what is ethical hacking, what are the types of ethical hacking, impact of Hacking on Businesses and Governments. This paper studied the different types of hacking with its phase angle.
Â
Vol 3, No 2 (2018): Moving Object tracking from a video by using Gray level Cooccurrence Matrix
Authors:Â Sharon M, Latha Ap
Abstract:Â Moving objects tracking it is procedures for intellectual video surveillance. Object tracking has extensive presentations in a Traffic Information, Surveillance, Mobile robot, and Weather Analysis. It is an imperative feature to define a thing while tracking it involves the location and silhouette of the article in every single structure. In this paper we used a tracking algorithm which combines improved Gray level co-occurrence matrix texture information to define moving objects and in order to reduce the time complexity and it is more accuracy. The main goal is to track the number of moving objects in a video sequence by using Gray-level cooccurrence matrix.
Vol 3, No 2 (2018): End-To-End Security Approach of Web Services
Authors:Â Ria Paneri, Avani Vagadiya, Farjana Girach, Priyanka Raval
Abstract:Â Service Orientated architecture is very emerging field and effective architecture, so it is widely acceptable for distributed application development. SOA provides better functionalities to fulfill business enterprise dynamics. Web services are vital part of SOA which provides flexibility, composability, reusability which makes application building activities easier. With adaptation of SOA in industries, web services have become an integral component. Consumers are interested in quality, security, reliability and performance rather than SOA functionalities. To provide security as a feature several security standards like web service security standards and WS security policy have been adopted in recent years. WS security is a cryptographic approach that states a strategy and specification to combine different security technologies. In this paper, study of framework which enhances the end to end security concepts is given and this framework increases security at service level. The proposed framework will increase the software reliability and secure an application end to end.
Vol 3, No 2 (2018): Cloud Data Rijndael Encryption Algorithm
Author:Â Dr. K. Vikram
Abstract:Â As per recent time cloud data had gone through many new issues regarding securities as cloud is becoming one of the recent requirement in many sectors like Finance, Stock Market, Industrial Sectors and so on. As per demand of cloud services are increasing, issues regarding its security which is necessary. This paper focus on providing a encryption technique known as Rijndael algorithm. Also we have use a compression technique, which is also a key issue regarding cloud storage and management, this technique is generally known as Open-SSL. This system will provide a user interface for user by which he/she can upload the file to the cloud. This system will first provide compression and then will proceed to further encryption after which the file be securely stored in cloud. Then this file will only be access by authorized Personnel.
Vol 3, No 1 (2018): Website Hacking and Its Defensive Countermeasures
Authors:Â Prateek Jain, Ayush Sharma, Srishti Bisht, Srishti Negi
Abstract: In this new era of internet and websites that have brought the world more closely and makes everything simple and convenient there also come some of the great threats. Hacking is one of the threat and a global problem. Hacking basically means getting unauthorized access to someone’s personal information and data without even knowing the intended user. Hacking is an illegal activity that hackers do for their own profit and money, they steals users details like card details, bank details etc. and misuse them. Hacking a network or a personal website may include not only access to the data but also to the loss of data, credentials and inappropriate usage. There are many ways to do so as getting access to the database, getting the server crashed, leaving viruses and worms, changing the front end of the website etc.
Vol 3, No 1 (2018): Technical Support through Ticket Control Using ERP system (Web Application)
Authors:Â Smita Mahadev Kagwade, Sujata Sunil Jamdade, Saniya Toufik Kokane, Trupti Suhas Manjare, Yashashri Chandrashekhar Joshi, Kartik Nikam
Abstract:Â Technical support through ticket control is an ERP system to make calls more efficient in hardware store .This System is a software application developed to manage most of the activities or tasks running in a hardware store .This system has divided into three main modules that are Ticket control , Enquiry And Stock management, Replacement and maintenance of various products. This application will provide features such as Call and Time management, stock management to control stock availability, staff information management to handle employee details, supplier information management for purchasing order and generate report
Vol 3, No 1 (2018): Deployement of Data Analytics in Defending Web Attacks
Authors:Â K.Thirumoorthy, S. Gokul
Abstract:Â The approach consists of analyzing the web application source code for input validation vulnerabilities for XSS attacks. We explore the use of a combination of methods to detect this type of vulnerabilities: static analysis and data mining. Static analysis in source code, but tends to report much nonvulnerability due to its undecidability. This problem is particularly difficult with languages such as PHP that are weakly typed and not formally specified. Therefore, we complement a form of static analysis, with the use of data mining to predict the existence of false positives. To predict the existence of false positives we introduce the novel idea of assessing if the vulnerabilities detected are false positives using data mining and use a combination of data mining algorithm to find the top-ranking classifiers to flag every vulnerability as false positive or not.
Vol 3, No 1 (2018): A Novel Trust Propagation Model with Deceptive Recommendation Penalty Scheme for DDOS Attacks
Authors:Â Prabakeran Saravanan, Dr T.Sethukarasi, Indumathi V
Abtract:Â Securing system exercises through a conveyed assignment of checking and alleviation is been taken after finished a long time by different scientists. The pre-task models of the so far proposed technique is exceedingly versatile against DDoS; the post-agent nature of the strategies need lacking neighbors to hold the procedure as previously. In particular, enhancement based strategies result in neighborhood optima issue from which a constrained arrangement sets are separated from everyone else determined. Despite the fact that the streamlining produces better utilizing arrangements, the neighborhood optima joining may not deliver a superior impact over securing the system. Trade of control messages tasks to be weak in existing together with the improvement strategy This retards the network resilience alongside the intrinsic behavior of the optimization technique .so in this paper we present a new approach for a trust based propagation model in the context of recommender systems. The idea of this modeling is that trust worthiness in a particular user depends not only on the trust value in the opinion of that user but also on the deceptive recommendation penalty feedback system Experimental results on real-world data sets demonstrate the effectiveness of the proposed approach.
Vol 3, No 1 (2018): A Study of Various Attacks on Online Banking Services
Authors:Â Dr. Surendra Yadav, Ashish Sharma, Prerna Verma
Abstract: In the modern era the online banking is a major requirement for the electronic commerce and other type’s transaction such as online shopping, e-payment, money transfer etc. In generally people are also using internet banking for their convenience any where any time. In this paper we propose a analysis of various attacks and various issues of online banking services. It is great change of the traditional banking to the online banking. Online banking system addresses several things anytime, anywhere services. But the major issue is security of the online banking services. Online banking which is a security based system there are various issues like risks, attacks that can affect the user’s view. Users increase the use of online banking facilities, but it increase the criminal activities like phishing, ATM fraud, credit fraud, identity theft, denial of service attacks. These types of attacks affect the online banking services. The question arise security issues against these attacks. In this survey mainly focus on the online banking attacks and their action.
2017
Vol 2, No 3 (2017): Analysis of Security Issues for Debit Cards and Pin
Authors:Â Dr. Surendra Yadav, Ashish Sharma, Neha Tiwari
Abstract: This paper demonstrates attempted to identify key quality attributes of internet banking security issues for CARDS (plastic Money) and PIN by analyzing internet banking customers & their comments on banking experience. The findings of this study show that despite of many advantages of online Plastic Money like ATM CARDS. Although every bank today provides the facility of Electronic banking but most of people suffers some transaction issues once a month. Identification & measurement of customer’s expectations of the Electronic banking services provide a frame of reference & their related quality dimension. Therefore, the implementation of quality initiatives should begin with defining customer’s need, preferences and their related quality dimensions. There is still a lot needed for the banking system to make reforms and train their customers and staff for using internet for their banking accounts, It immerses from the survey that the main problem faced by the customer is the fear of hacking the PIN of CARDS and thus they avoid going for uses of ATM and other CARDS for banking. Banks are trying their level best by providing the best security options to the customers but then there are lots of factors which betray a customer from using ATM CARDS. They have come into operation during the last two decades and the same has assumed during the last few years. CARD otherwise known as “PLASTIC MONEY†is widely used by the consumers all around the world.