Version-1 (Nov-Dec 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Abstract: When we are sending a secret information fromsource to destination over a wireless network, safe and secure transmission is a critical issue. An ad-hoc network is a set of wireless nodes and any type of central control or centralized administrationis not in this network. Wireless Ad-hoc networks are organized and configured in self mode. Each and every node in this network is set up using a wireless transmitter and a wireless receiver. The networktransmits data with other nodes in its communication range only. When the data are transmitted, the nodes communicate with each other usinga common physical media. The nodes send and receive signals using the same frequency band and by doing so, it follows the same hopping method. If the receiving node is not inside the transmission range.........
Keyword: Network Security, Plaintext, Cipher Text, Cryptology, Multi-level Encryption, Decryption
[1]. Here we have mentioned various references from which we actually collected our problem and Also found the solution for our
problem.
[2]. Kejun Liu, Jing Deng, Member, IEEE, Pramod K. Varshney, Fellow, IEEE, and Kashyap Balakrishnan, Member, IEEE
[3]. L. Buttyan and J.-P. Hubaux, "Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks," ACM/Kluwer Mobile
Networks and Applications, vol. 8, no. 5, 2003.
[4]. K. Balakrishnan is with the Security Services Group, Deloitte and Touche LLP, 1750 Tysons Boulevard, Suite 800, McLean, VA
22102. E-mail: kbalakrishnan@deloitte.com.
[5]. S. Marti, T. Giuli, K. Lai, and M. Baker, "Mitigating Routing Misbehavior in Mobile Ad Hoc Networks," Proc. MobiCom, Aug.
2000..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Energy Consumption Algorithms on Green Computing Technology |
Country | : | India |
Authors | : | D. Jasmine Priskilla |
: | 10.9790/0661-2006010608 |
Abstract: Green computing is the eco-friendly technology for the environmentally responsible of computers and their resources usage. Green computing is also defined as the way that reduces their environmental impact on study of designing, engineering, and manufacturing, using and disposing of computing devices.The data centre includes all the aspects of energy usage in an efficient manner from the IT equipment to the HVAC (Heating, ventilation and air conditioning) equipment of actual construction of the labs and offices.Green computing concept is introduced in 1992, by the Environmental Protection Agency (EPA) in the Energy Star Program. Many IT companies are trying to invent the energy-efficient computing devices for reducing the wastages and improving the recycle techniques in the creation of digital devices.Green Computing, additionally called green innovation, is the earth dependable utilization..........
Keywords–Green computing, computing energy conservation, energy efficiency data
[1]. "Best Practices Guide for Energy-Efficient Data Center Design", prepared by the National Renewable Energy Laboratory for the U.S. Department of Energy, Federal Energy Management Program, March 2011.
[2]. Alonso, Pedro, "Improving power efficiency of dense linear algebra algorithms on multi-core processors via slack control", IC on High Performance Computing and Simulation (HPCS), 2011,PP 463- 470.
[3]. Krongold, Brian Scott, "Computationally efficient optimal power allocation algorithms for multicarrier communication systems", Communications, IEEE Transactions on Jan 2000, pp 23-27.
[4]. Jianlizhuo and chaitalichakrabarti "Energy-Efficient Dynamic Task Scheduling Algorithms for DVS Systems", ACM Journal Name, Vol. V, No. N, Month 20YY, Pages 1– 22.
[5]. EPA: ENERGY STAR Program. Report to Congress on Server and Data Center Energy Efficiency. Technical report, United States Environmental Protection Agency (2007).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Study On Diffie Hellman Algorithm And Elliptic Curve Cryptography |
Country | : | India |
Authors | : | S.Uma Mageshwari || Dr. R.Santhi |
: | 10.9790/0661-2006010911 |
Abstract: Cryptography is the vast discipline to provide security at a greater level for our information. The Diffie Hellman (DH)Algorithm and Elliptic Currve Cryptography(ECC) are two different approaches to provide unique key. Using keys, data can be encryted( plaintext to ciphertext) and decrypted( ciphertext to original text).While transmitting data in a network, it should be safeguard from third party. The unique identification of key helps us to transmit data in a secured manner as well as an intruder not able to identify the key.The keys shows an important role in keeping the information confidential. This paper highlights the significance of keys , Diffie – Hellman algorithm with sample output and basics of Elliptic Curve Cryptography
Keywords–Diffie Hellman, ECC, Key.
[1]. Cryptography and Network Security – William Stallings, Fourth Edition, PHI,2006.
[2]. https://www.cryptomathic.com/news-events/blog/classification-of-cryptographic-keys-functions-and-properties.
[3]. https://security.stackexchange.com/questions/46802/what-is-the-difference-between-dhe-and-ecdh
[4]. Certicom,https://www.certicom.com/ecc
[5]. Elliptic Curve Cryptography: a gentle introduction, http://andrea.corbellini.name/2015/05/17/elliptic-curve-cryptography-a-gentle-introduction/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Issues and Attacks in Wireless Sensor Network |
Country | : | India |
Authors | : | M.Sujatha |
: | 10.9790/0661-2006011215 |
Abstract: Remote sensor arranges is a standout amongst the most developing innovation for detecting and playing out the distinctive undertakings. Such systems are valuable in numerous fields, for example, crises, wellbeing observing, ecological control, military, enterprises and these systems inclined to vindictive clients' and physical assaults because of radio scope of system, un-confided in transmission, unattended nature and get to effectively. Security is a crucial prerequisite for these systems. In this paper, our focal point of consideration is on physical assaults and issues in remote sensor systems. Through this audit, effectively recognize the reason and capacities of the aggressors. Further, we talk about surely understood methodologies of security recognition against physical assaults.
Keywords–Remote sensor, Security, Transmission, Numerous
[1]. Haboub, R. and M. Ouzzif, 2011. Secure Routing IN WSN. International Journal, pp: 2.
[2]. Jain, M.K., 2011. Wireless sensor networks: Security issues and challenges. International Journal of Computer and Information Technology, 2(1): 62-67.
[3]. Singh, S.K., M. Singh and D. Singhtise, 2011. A survey on network security and attack defense mechanism for wireless sensor networks. Int. J. Comput. Trends Tech, pp: 5-6.
[4]. Deng, J., R. Han and S. Mishra, 2005. Defending against path-based DoS attacks in wireless sensor networks. in Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks. ACM.
[5]. Ning, P., A. Liu and W. Du, 2008. Mitigating DoS attacks against broadcast authentication in wireless sensor networks. ACM Transactions on Sensor Networks (TOSN), 4(1): 1/
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Steganography Techniques Used To Hide the Information |
Country | : | India |
Authors | : | K.Priya |
: | 10.9790/0661-2006011619 |
Abstract: Steganography is a technique for hiding data behind the file such as image, audio, video etc. and that data securely transfer from sender to receiver. It serves as a better way of securing message than cryptography which only conceals the content of the message not the continuation of the message. Original message is being hidden within a file such that the changes so occurred in the file are not noticeable. To hide the secret information verity of steganography techniques can be used and are more complex than others while all of them have respective strong and weak points. The absolute invisibility of the secret information is maintained by different applications, while others require a large secret message to be hidden. This paper discussesan overview of image steganography, its uses and techniques to satisfy the need for privacy on the internet. Various steganography techniques to provide privacy while transferring data from source to destination
Keywords–steganography, cryptography, secret information, digital image.
[1]. http://www.lia.deis.unibo.it/Courses/RetiDiCalcolatori/Progetti98/Fortini/history.html
[2]. http://stegano.net/tutorial/steg-history.html
[3]. https://null-byte.wonderhowto.com/how-to/introduction-steganography-its-uses-0155310/
[4]. Steganography and steganalysis-Robert Krenn, Internet Publication, March 2004 http://www.krenn.nl/univ/cry/steg/article.pdf
[5]. Steganography and Its Applications in Security, International Journal of Modern Engineering Research (IJMER) www.ijmer.com Vol.2, Issue.6, Nov-Dec. 2012 pp-4634-4638 ISSN: 2249-6645
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Knowledge discovery in databases (KDD) is characterized as the non-unimportant extraction of valid certain, possibly valuable also, at last reasonable data in expansive databases For quite a while, an extensive variety of utilizations in different spaces have profited from KDD strategies and numerous works have been directed to this point. The issue of mining, visit designs emerged first as a sub-issue of mining affiliation rules, however, it at that point swung out to be available in an assortment of issues. Since the multifaceted nature of this issue is exponential in the span of the double database input connection and for this connection needs to be checked a few times amid the procedure, effective calculations for mining, visit designs are required. So I show an effective calculation that produces all noteworthy affiliations leads between things in the database. The calculation...........
[1]. R. Agrawal, T. hnielinski, and A. Swami. Mining association rules between sets of items in large databases. In Proc. ACM SIGMOD Int'l Conf. on Management of Data, pages 207-216, May 1993.
[2]. R. Agrawal and l~. Srikant. Fast algorithms for mining association rules in large databases. In Proe. of the ~Oth Int'l Conf. on Very Large Data Bases (VLDB), pages 478-499, June 1994.
[3]. R. Agrawal and R. Srikant. Mining sequential patterns. In Proe. of the llth Int'l Conf. on Data Engineering (ICDE), pages 3- 14, Mar. 1995.
[4]. Y. Bastide, N. Pasquier, R. Taoull, G. Stumme, and L. Lakhal. Mining minimal non-redundant rules using frequent closed itemsets. In Proc. of the 1st Int'l Conf. on Computational Logic (6th Int'l Conf. on Database Systems - DOOD), pages 972-986. Springer, July 2000.
[5]. S. D. Bay. The UCI KDD Archive [http://kdd.icn. uci .edu]. Irvine, CA: University of California, Department of Information and Computer Science.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Effective query processing techniques for heterogeneous application data |
Country | : | India |
Authors | : | P.Hariharan || K.Arulanandham |
: | 10.9790/0661-2006012326 |
Abstract: In the different application environment, in order to a chievea effective query processing result stechniques are required. This type of effective query processing result techniques are implementing in order to different applications at the time of developing, the respective applications of query processing results will be very effective and needful. This paper gives well suited techniques for effective equery processing frame work in different applications such as E-learning, Banking and health data
Keywords–Energy consumption ontology, Information retrieval
[1]. The National Center for Biomedical Ontology,www.bioontology.org Swathi Rajasurya, Tamizhamudhu Muralidharan, Sandhiya Devi, S.S wamynathan Semantic Information Retrieval Using Ontology In University Domain", 2012, CoRRabs/1207.5745
[2]. D. T sarkovandI .Horrocks, FaCT DescriptionLogicReasoner: System Description.InThirdInternational Joint Conference onAutomatedReasoning,2006, pages 292–297. Springer.69
[3]. E. Kayaaslan, B.B. Cambazoglu,R. Blanco, F. P. Junqueira, and C. Aykanat, "Energy-price-drivenquery processingin multi-center web search engines," in Proc. SIGIR, 2011, pp. 983–992.
[4]. R. Blanco, M. Catena, and N. Tonellotto, "Exploiting green energy to reduce the operational costsof multi-center websearchengines," inProc. WWW,2016, pp. 1237–1247.
[5]. A. Teymorian, O. Frieder, andM. A. Maloof, "Rank-energy selective query forwarding for distributed search systems," inProc.CIKM,2013,pp.389–398
- Citation
- Abstract
- Reference
- Full PDF
Abstract:As the Internet has become an essential tool in human life, a need for building accessible web pages is being emphasized. Universal design indicates implementation of products and services that are fair and easy to use, regardless of age or disability. Universal design emphasizing universality, thus, shares common goals with web accessibility, and web pages built with universal design can improve universality. In this paper, we evaluated web accessibility of domestic websites that are highly used in the purpose of using the Internet, identifying whether such pages adopt the principles of the universal design correctly. The results showed that web accessibility gets better each year but universal design principles are not observed in many pages.
Keywords– Evaluation of Accessibility, HCI, Mobile Accessibility, Web, Web Accessibility, Universal Design,
[1]. Jim Thatcher andMichael R Burks, Web accessibility & web standards and regulatory compliance, Acorn Publishing Co, 2011.
[2]. Wonkyung Lee andEungyoungSeo, Website Design for Improving Accessibility of Disabled People, Journal of the Korean Society
for Information Management, 30(1), 2013, 193-219.
[3]. Jonghong Jeon andSeungyun Lee, UI/UX Technology Trends in the Next Generation Web, Communications of the Korean Institute
of Information Scientists and Engineer, 29(8), 2011, 9-17.
[4]. Moonyoung Lee, A Study on E-Learning UI Design for the Elderly based on Universal Design, Graduate School of Dongguk
University, Department of Multimedia, Korea, 2013.
[5]. Suyun Hong, A study on the Design Factor Analysis in a High Preferable Web site Design - With a focus on Graphic Image, Color,
Layout, Background –With a focus on Graphic Image, Color, Layout, Background, Korean Design Forum, 34,2012, 561-570.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Profited from distributed computing, clients can accomplish a powerful and sparing methodology for information sharing among gathering individuals in the cloud with the characters of low support and little administration cost. Then, we should give security insurances to the sharing information records since they are outsourced. Lamentably, in view of the continuous change of the participation, sharing information while giving security saving is still a testing issue, particularly for an untrusted cloud because of the intrigue assault. Besides, to exist conspires, the security of key appropriation depends on the protected correspondence channel, be that as it may, to have such channel is a solid supposition and is troublesome for practice. In this paper, we propose a secure information sharing plan for element individuals..............
Keywords– ................
.................
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In network system, there are several Open source servers such as DNS, Mail, FTP, Web and SIP. To maintain a secure network environment every server administrator follows an effective method for controlling and operating the different servers and protect them from several attacks because Security is the main issue for networking system. In this research, we established a secure environment for open source based servers using packet filtering firewall tools known as iptables. To protect the open source servers from external attack we have applied some rules at Linux iptables on the basis of respective port numbers, allowing and disallowing particular IP address or IP addresses with subnet for the important protocols like TCP, UDP, RTP and ICMP. After applying rules on protocols............
Keywords– Open Source Servers; Iptables; SIP server; Wireshark; Server Security.
[1]. William Stallings, Cryptography and Network Security Principles and Practices,(4th ed, Prentice Hall,2005).
[2]. Ali Mohammed, Sachin Sama and Majeed Mohammed, Enhancing Network Security in Linux Environment, School of Information
Science, Computer and Electrical Engineering, Halmstad University, Sweden, February 2012.
[3]. Kinjal Shah, Satya Prakash Ghrera, Alok Thaker, A Novel Approach For Security Issues In VOIP Networks In Virtualization With
IVR. International Journal of Distributed and Parallel Systems (IJDPS),3(3), May 2012.
[4]. Muhammad Arafat, Muhammad Alam, Feroz Ahmed, Study on Security Issue in Open Source SIP Server , Modern Applied
Science, 8(2), 2014.
[5]. Sowgandh Sunil Gadi, Security hardened kernels for linux servers, Wright State University, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Chilli plant is one of the major cash crop in the world, many economy depends on its production. Chilli farmer has lost a lot of their crop due to diseases which in return causes farmers to loss lot of money and time such Chilli disease includes grey Mould, Bacterial soft/wilt, pepper mosaic virus, Anthracnose, Damping off, Chilli Wilt, Basal stem rot etc. The symptoms sometimes can be very difficult to identify by a human expert which often leads to the death of the chill plant. The goal of this research is to develop a Fuzzy logic system for diagnosing various types of Chilli plant diseases, and also to illustrate the architecture of fuzzy logic system. The knowledge base system holds the symptoms for Chilli diseases and a sequence of methodical and analytical decision steps that enhance the quality and meaning of the logic. The system eliminates the uncertainties often associated with human expert. The software used for the development of necessary Graphical User interfaces (GUI), for fuzzy modeling, fuzzy inference system editor, membership function editor, rule editor, rule editor, rule viewer and surface viewer is MATLAB. The system has been tested by some domain experts.
[1]. Bosland PW, Botava EJ. (2000): Peppers: vegetable and spice capsicums. CABI. Publishing, Wallingford, United Kingdom. pp.
204-205)
[2]. Wang, D., W. Paul and P.W. Bosland, (2006). The Genes of Capsicum. Hort Science, 41(5): pp.1169-1187.
[3]. El-Ghoraba AH, Javedb 4Q, Anjumb FM, Hamedc SF, Shaabana HA (2013). Pakistani Bell Pepper (Capsicum annum L.):
Chemical Compositions and its Antioxidant Activity. International Journal of Food Properties, pp. 18-32
[4]. Wahyuni Y, Ballester A-R, Sudarmonowati E, Bino RJ, Bovy AG,(2013). Secondary Metabolites of Capsicum Species and Their
Importance in the Human Diet. J. Nat.Prod.,DOI:10.1021/np300898z (online first)
[5]. Karungi J, Obua T, Kyamanywa S, Mortensen CN, Erbaugh M, (2013). Seedling protection and field practices for management of
insect vectors and viraldiseases of hot pepper (CapsicumchinenseJacq.)in Uganda. International Journal of Pest
Management.DOI:10.1080/09670874.2013.772260 (online first).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Self Repairing Of Routing In MANET Using Weight Factor |
Country | : | India |
Authors | : | Ashwani Kush |
: | 10.9790/0661-2006016571 |
Abstract: The challenge of wireless communication is that, the environment that wireless communications travel through is unpredictable. Wireless networks that fix their own broken communication links may speed up their widespread acceptance. An effort has been made to propose an on-demand distributed algorithm for self-organizing, multihop, mobile packet radio large network. These nodes are independently controlled and are dynamically reconfigured as nodes may move from one range to another. It is seen that when the network size increases, per node throughput of an ad hoc network rapidly decreases. This is due to the fact that in large scale networks, flat structure of networks results in long hop paths which are prone to breaks. A weight factor has been added that will be broadcast to each node in the network. The proposed algorithm is robust due to the motion, failure, insertion or deletion of nodes. This non periodic algorithm reduces the cost due to computation and communication. Simulation experiments evaluate the performance of the proposed scheme
Keywords: Mobile Ad Hoc networks, Self healing, Load balancing, Mobile computing, Routing
[1]. A. Amis and R. Prakash, Load balancing clusters in wireless ad hoc networks, Proceedings of ASSET 2000, Richardson, TX, March 2000, pp. 25–32.
[2]. D. J. Baker and A. Ephremides, A distributed algorithm for organizing mobile radio telecommunication networks, Proceedings of 2nd International Conference on Distributed Computer Systems, April 1981, pp. 476–483.
[3]. S. Basagni, I. Chlamtac and A. Farago, A generalized clustering algorithm for peer-to-peer networks, Proceedings of Workshop on Algorithmic Aspects of Communication, July 1997.
[4]. A.Kush,Divya,Vishal ," Energy efficient Routing for MANET" , Intl conf on applied and communication tech, Elsevier Publ, pp 189-194., 2014
[5]. M. Chatterjee, S. K. Das and D. Turgut, WCA: A Weighted Clustering Algorithm for Mobile Ad Hoc Networks, Cluster Computing 5, Jun 2002, pp. 193-204..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The thought of Cloud computing has reshaped the field of distributed systems as well as fundamentally changed how businesses use computing today. While Cloud computing gives many progressed highlights, it actually has a few weaknesses like the somewhat high operating expense for both public and private Clouds. The space of Green computing is additionally turning out to be progressively significant in a world with limited energy resources and a steadily rising interest for more computational power. In this paper another structure is introduced that gives proficient green improvements within an adaptable Cloud computing architecture. Utilizing power-aware scheduling methods, variable resource management, live relocation, and an insignificant virtual machine plan, generally speaking.....
Keywords: Cloud, Storage, data
[1]. Baron, "The importance of 'ad-hoc data': A definition," 2012.
[2]. C. Ranger, "Ad-hoc data: science in the petabyte era," Nature 455 (7209): 1, 2014.
[3]. D. Kossmann, T. Kraska, and S. Loesing, "An evaluation of alternative architectures for transaction processing in the cloud," in Proceedings of the 2012 international conference on Management of data. ACM, 2012, pp. 579–590.
[4]. F. Cordeiro, J. Dean, S. Ghemawat, W. Hsieh, D. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. Gruber, "Bigtable: A distributed structured data storage system," in 7th OSDI, 2013, pp. 305–314.
[5]. J. Ekanatake, "The hadoop distributed file system: Architecture and design," Hadoop Project Website, vol. 11, 2012..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: In recent years automation has played an important role in developing human life and enhancing
safety and security protocol. Smartphones are common among all people. Day-to-day household work like
switching ON /OFF the fan or lights, decrement or increment in air conditioner temperature can be easily done
using a smartphone. Today home automation system (HAS) has been a major part of research in recent times.
Home automation using the android platform reduces the process of individual involvement and enhances
easier and faster daily household needs for everyone. The home automation system (HAS) designed and
implemented on the android platform has been interfaced with an 8-bit microcontroller i.e. Arduino to control
the home appliances using the relay. Bluetooth has been used as the most reliable and efficient technology for
small-range communication. Different type of sensor has been used which are illustrated in detail below. This
paper provided a novel approach to enhancing automation in household services and eliminating the traditional
method of switching.
[1]. Weimei Zhang, "Study about IOT's application in Digital Agriculture construction", Electrical and Control Engineering (ICECE)
2011 International Conference, pp. 2578-2581.
[2]. Mircea Murar and Stelian Brad, "Monitoring and controlling of smart equipments using Android compatible devices towards IoT
applications and services in manufacturing industry", Automation Quality and Testing Robotics 2014 IEEE International
Conference, pp. 1-5.
[3]. Takeshi Yashiro, Shinsuke Kobayashi, Noboru Koshizuka and Ken Sakamura, "An Internet of Things (IoT) Architecture for
Embedded Appliances", Electrical and Control Engineering (ICECE) 2011 International Conference, pp. 2578-2581, 2011.
[4]. M. J Keertikumar, M. Shubham and R.M. Banakar, "Evolution of IoT in Smart Vehicles: An Overview", IEEE Computer Society,
pp. 804-809.
[5]. Takayuki Suyama, Yasue Kishino and FutoshiNaya, "Abstracting IoT devices using virtual machine for wireless sensor nodes" in
Internet of Things (WF-IoT) 2014 IEEE World Forum, Seoul, pp. 367-368, 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detection of Fruit Quality by C NN Algorithm |
Country | : | India |
Authors | : | Dr.S.Pariselvam || Mr.P.Anandajayam || Mrs.S.Kalaivani |
: | 10.9790/0661-2006018085 |
Abstract: Quality and safety are the key factors in modern food industries. The quality of fruits and vegetables is a common combination of characteristics, attributes and properties that have significance and make for acceptability. One of the most popular applications of computer vision is to inspect qualities of food products based on form, color and presence of defects. Appearance factors such as size or dimension, shape, surface texture, surface color, and external or surface defects define external quality and directly influence consumers in purchasing a product, and they can be evaluated by means of computer vision techniques. To overcome this problem, this paper presents a reliable detection method by making use of tensor flow library, Faster R-CNN algorithm and softmax classifier used to detect the quality of fruit. Faster R-CNN algorithm is a capable classification algorithm in which both region proposal generation and objection tasks are all done by the same convolutional networks.
Keywords— deep learning, Faster R-CNN, convolution neural network, tensor flow, fruit quality inspection
[1] Belsha. N, Hariprasad. N, "An Approach for identification of infections in vegetables using Image Processing
Techniques",International Conference on Innovations in Information,Embedded and Communication Systems (ICIIECS), vol. 04,
pp. 507-512, 2017.
[2] Alok Mishra, Pallavi Asthana, Pooja Khanna, "The quality identification of fruit in image processing using Matlab", International
Journal of Research in Engineering andTechnology, Vol. 03, Issue. 10, pp. 92-95, June - 2014.
[3] Rashmi Pande, Nikunj Gamit, Sapan Naik, "Non-Destructive Quality Grading Of Mango (Mangifera Indica L) Based On CIELAB
Colour Model and Size", IEEE International Conference on Advanced Communication Control and Computing Technologies, pp.
1246-1251, 2014.
[4] Y. Zhu, R. Urtasun, R. Salakhutdinov, and S. Fidler. segDeepM: Exploiting segmentation and context in deep neural networks for
object detection. In CVPR, 2015.
[5] P. Sermanet, D. Eigen, X. Zhang, M. Mathieu, R. Fergus, and Y. LeCun. OverFeat: Integrated Recognition, Localization and
Detection using Convolutional Networks. In ICLR, 2014.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Information Security |
Country | : | |
Authors | : | Somnath Saha |
: | 10.9790/0661-2006018688 |
Abstract: Organizations rely heavily on the use of information technology (IT) products and services to run their day-to-day activities. Ensuring the security of these products and services is of the utmost importance for the success of the organization. The main reason is that security is expensive to set up and a nuisance to run, so people judge from experience how little of it they can get away with. Since there's been little damage, people decide that they don't need much security. In a distributed system with no central management like the Internet, security requires a clear story about who is trusted for each step in establishing it, and why. The basic tool for telling this story is the "speaks for" relation between principals that describes how authority is delegated, that is, who trusts whom. The idea is simple, and it explains....
Keywords— Information, Cyber Crime, Network Security, Internet of Things, Attacks
[1]. Abrams, M. D. and Moffett, J. T. (1995). "A Higher Level of Computer Security Through Active Policies," Computer & Security, Vol. 14, No. 2, pp. 147-157.
[2]. Abrams, M. D. and Podell, H. J. (1995). "Evaluation Issues," in Abrams, M.D., Jajodia, S. and Podell, H.J. (Eds.), Information Security - An Integrated Collection of Essays, Los Alamitos, CA: IEEE Computer Society Press. Ajzen, I. (1991). "The Theory of Planned Behavior," Organizational Behavior and Human Decision Processes, Vol. 50, pp. 179-211.
[3]. BBC (2015) Talk talk cyber attack, BBC. Available at: http:// www.bbc.co.uk/news/uk-34611857 (accessed 10 May 2016).
[4]. Computer Security Act of 1987, Public Law 100-235, 101 Stat 1724 https://www.gpo.gov/fdsys/pkg/STATUTE-101/pdf/STATUTE-101- Pg1724.pdf.
[5]. E-Government Act of 2002, Public Law 107-347, 116 Stat 2899. http://www.gpo.gov/fdsys/pkg/PLAW-107publ347/pdf/PLAW107publ347.pdf.