Cloud Computing-Positive Impacts and Challenges in Business Perspective
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.786-789, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.786789
Abstract
Due to rapid growth of computing resources over the past years, cloud computing has been treated as a prominent research field and this technology appeared as a new solution in the IT field. Many businesses including small, medium and enterprise are migrating to this technology for so many reasons such as computing resources, reduced total cost of ownership, on demand services, increased revenue and many more. Cloud Computing offers number of advantages of cloud migration that motivated the business enterprises to adopt this change. There are so many challenges for the companies adopting cloud computing like interoperability, portability, organizational aspects and the most important challenge is the security and privacy of the information. There are different solutions or suggestions that a company should follow to overcome various challenges and issues.
Key-Words / Index Term
Cloud computing, positive impact, challenges, Solutions
References
[1]. Leimeister, Stefanie, Markus Böhm, Christoph Riedl, and Helmut Krcmar. "The Business Perspective of Cloud Computing: Actors, Roles and Value Networks." In ECIS, p. 56. 2010.
[2]. Bo, Khin Sundee. "Cloud Computing for Business." International Journal of Advances in Scientific Research and Engineering 4 (2018).
[3]. http://www.studentie.ro/campus/cloud_computing___solutie_pentru_companiile_care_vor_sa_castige_un_ava/c-71-a-204227
[4]. Baciu, Iacob Emanuel. "Advantages and disadvantages of cloud computing services, from the employee`s point of view." (2015).
[5]. Rajkumar Buyya, Christian Vecchiola, S. Thamarai Selvi “Matering Cloud Computing: Foundation and application programming”, Publishing: Elsevier, 2013
[6]. Lisievici, A. A few legal challenges related to the adoption of cloud-based solutions, Romanian Magazine of Business Law, issue no. 8/31.08.2014.
[7]. http://www.theguardian.com/media-network/partner-zone-microsoft/why-businessesswitching-cloud-computing
[8]. Bhopale, Shrikant D. "Cloud Migration Benefits and Its Challenges Issue." IOSR Journal of Computer Engineering (IOSR-JCE) ISSN (2013): 2278-0661.
[9]. Gregor Petri “Vendor lock-in and cloud computing”, 2014 IBM and Economist Intelligence Unit “Cloud computing drives innovation”, 2014
[10]. Ankey, J.(2011, March). Heads in the cloud. Entrepruneur, 39(10), 50-51
[11]. https://www.thbs.com/thbs-insights/cloud-computing-overview
[12]. Devasena, C. Lakshmi. "Impact study of cloud computing on business development." Operations Research and Applications: An International Journal (ORAJ) 1, no. 1 (2014): 1-7.
[13]. Huth, Alexa, and James Cebula. "The basics of cloud computing." United States Computer (2011).
[14]. https://www.tutorialspoint.com/cloud_computing/cloud_computing_challenges.htm
[15]. Opara-Martins, Justice, Reza Sahandi, and Feng Tian. "Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective." Journal of Cloud Computing 5, no. 1 (2016): 4.
[16]. https://www.tutorialspoint.com/cloud_computing/cloud_computing_security.htm
[17]. Richard Holland. Ten Steps to Successful Cloud Migration. Eagle Genomics Ltd.White Paper(2011),
[18]. Catalina, Ilie Stefana. Cloud computing - impact on business. (2015).
[19]. Georgiou, Dimitra A. "Security policies for cloud computing." (2017).
Citation
A.A. Dar, "Cloud Computing-Positive Impacts and Challenges in Business Perspective," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.786-789, 2019.
Secure Software Architecture: A Hybrid Approach Based On Non-Functional Security Requirements
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.790-794, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.790794
Abstract
In the last decades, software engineering has become an important area of research. As researchers, we try to identify a problem, a need, or a hole in some research topic, once identified we make an effort to produce new techniques, methods, and tools that hopefully will help to improve the detected issue. In the present thesis the identified issue was the need of supporting non-functional requirements in the software architecture design where these requirements are the drivers of the architectural decision-making. This paper demonstrates that a relatively new software engineering discipline, model-driven development, was a good place to propose a solution for the detected issue. We envisioned how non-functional requirements can be integrated in model-driven development and how this integration will impact in the architectural design activities. When we started to produce our techniques, methods, and tools for model-driven development we found out that there was a bigger hole in the web of knowledge than what we had initially foreseen. Much of the evidence of how non-functional requirements affect the software architecture design is hidden. This situation caused a turn in this paper. We needed to understand architects, how they think and how they make the architectural decisions, what is the role of non-functional requirements in the architectural decision-making process, and to what extent are the non-functional requirements important in this process.
Key-Words / Index Term
Software, Architecture, Non-functional Requirements
References
[1]. Lawrence Chung, Kendra Cooper, and Anna Yi. Developing adaptable software architectures using design patterns: an NFR approach. Computer Standards & Interfaces, 25(3):253–260, 2016.
[2]. M. Dal Cin. Extending UML towards a useful OO-language for modeling dependability features. In 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, pages 325–330, 2017.
[3]. Mary Shaw and David Garlan. Software architecture: perspectives on an emerging discipline. Prentice-Hall, Inc, Upper Saddle River, NJ, USA, 2016.
[4]. Simone Röttger and Steffen Zschaler. Model-Driven Development for Non-functional Properties: Refinement Through Model Transformation. In International Conference on the Unified Modeling Language (UML), pages 275–289, 2017
[5]. James Robertson and Suzanne Robertson. Volere. Requirements Specification Template. Edition 15. Technical report, Atlantic Systems Guild, 2016
[6]. Xavier Franch, Angelo Susi, Maria C. Annosi, Claudia Ayala Managing Risk in Open Source Software Adoption. In International Joint Conference on Software Technologies (ICSOFT), 2015.
[7]. R.B. Svensson, M. Höst, B. Regnell, ”Managing Quality Requirements: A Systematic Review,” EUROMICRO-SEAA 2014.
[8]. R.B. Svensson, T. Gorschek, B. Regnell, R. Torkar, A. Shahrokni, R. Feldt, A. Aurum “Quality Requirements in Practice: An Interview Study in Requirements Engineering for Embedded Systems,” REFSQ 2016.
[9]. N.D. Anh, D.S. Cruzes, R. Conradi, M. Höst, X. Franch, C. Ayala, “Collaborative Resolution of Requirements Mismatches when adopting Open Source Components,” REFSQ 2017.
[10]. A. Tang, M. Ali Babar, I. Gorton, J. Han, “A Survey of Architecture Design Rationale”. Journal of Systems and Software 79, 2016.
[11]. M.A. Babar, L. Bass, I. Gorton, “Factors Influencing Industrial Practices of Software Architecture Evaluation: An Empirical Investigation,” QoSA 2017
[12]. A.C. Edmondson, S.E. McManus, “Methodological Fit in Management Field Research,” Academy of Management Review 32, 2016.
Citation
Jameel Ahmad Qurashi, Sanjay Kumar, "Secure Software Architecture: A Hybrid Approach Based On Non-Functional Security Requirements," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.790-794, 2019.
Review and Analysis of Speech Recognition Techniques for Mobile Devices
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.795-800, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.795800
Abstract
The most widely correspondence modes for individuals is speech. People use speech as another mode to convey information without lifting a finger with the help of speech recognition applications. This paper presents a study about execution of speech recognition debilitates inside considering resounding and even low levels of including clamor. Speech recognition interfaces in local lingo which connects the people to use the advancement to more imperative degree without the data by operating with a PC. An extraordinary measure of research has done in different areas of speech recognition and its applications since three decades. A specific overlook on speech recognition has been done in this paper, introducing the design, databases, speech parameterization, techniques, attributes, apparatuses, applications and issues. Also analyzed performance with respective accuracy for different available techniques from various research work
Key-Words / Index Term
Automatic Speech Recognition (ASR), Mel Frequency Cepstral Coefficient (MFCC), Hidden Markav model (HMM), Gaussian Mixture Model (GMM)
References
[1] S. Karpagavalli., E. Chandra.,” A Review on Automatic Speech Recognition Architecture and Approaches”, International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 9, No. 4, pp. 394-398, 2016.
[2] S. Doda., R. Mehta.,”Speech Recognition Techniques: A Review”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 4, No. 8, pp. 944-947, 2014.
[3] S. Swamy., K. V. Ramakrishnan.,”An Efficient Speech Recognition System”, International Journal of Computer Science and Engineering, Vol. 3, No. 4, pp. 23-24, 2013.
[4] Vimal Krishnan, V. R. Babu., P. Anto., “Features of wavelet packet decomposition and discrete wavelet transform for Malayalam speech recognition”, Recent Trends Eng., Vol. 1, No. 2, pp. 93–96, 2009.
[5] S.K. Gaikwad., B.W. Gawali., P. Yannawar.,”A Review on Speech Recognition Technique”, International Journal of Computer Applications, Vol. 10, No. 3, pp. 17-21, 2010.
[6] Ben Messaoud, Z. Ben., H. amida, “CDHMM parameters selection for speaker-independent phone recognition in continuous speech system”, MELECON 2010 – IEEE Mediterranean Electrotechnical Conf., Valletta, Vol. 15, pp. 253–258, 2010.
[7] Z. Li., R. Chen., L. Liu., G. Min.,”Dynamic resource Discovery Based on Preference and Movement Pattern Similarity for Large-Scale Social Internet of Things”, IEEE Internet of Things Journal, Vol. 3, No. 4, pp. 583-587, 2015.
[8] L. Toth., “A hierarchical, context-dependent learning network architecture for improved phone recognition”, IEEE Int. Conf. on Acoustics, Speech, and Signal Processing ICASSP, pp. 5040–5043, 2011.
[9] M. A. Anusuya., S. K. Katti.,”Speech Recognition by Machine: A Review”, International Journal of Computer Science and Information Security, Vol. 6, No. 3, pp. 184-187, 2009.
[10] A. Ahad., A. Fayyaz., T. Mehmood., “Speech recognition using multiside perceptron”, IEEE Proc. Students Conf., ISCON’02, pp. 103–109, 2002.
[11] R. L. K. Venkateswarlu., R.V. Kumari., G.V. Jayasri., “Speech recognition using radial basis function learning network”, Third Int. Conf. on Electronics Computer Technology ICECT, Kanyakumari, pp. 441–445, 2011.
[12] M.M. Pour., F. Farokhi.,”A new approach for Persian speech recognition”, IEEE Int. Advance Computing Conf., IACC, Patiala, pp. 153–158, 2009.
[13] P. Zhou., L.Z. Tang., D.F. Xu., “Speech recognition algorithm of parallel sub band HMM based on wavelet analysis and learning network”, Inf. Technol. J., pp. 796–800, 2009.
[14] P. Saini., P. Kaur.,”Automatic Speech Recognition: A Review”, International Journal of Engineering Trends and Technology, Vol. 4, No. 2, pp. 133-135, 2013.
Citation
Gulbakshee J. Dharmale, Dipti D. Patil, Vilas M. Thakare, "Review and Analysis of Speech Recognition Techniques for Mobile Devices," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.795-800, 2019.
Clinical Document Architecture (CDA) Generation and Integration for Health Data Exchange based on Cloud Computing: A Survey
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.801-805, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.801805
Abstract
The Health level seven developed Clinical Document Architecture (CDA) is a core document that supports XML-based mark-up commonplace that is used to specify the structure, linguistics, and encryption of a clinical document like a discharge outline or progress note for the aim of exchange between totally different hospitals. A CDA document is a set of the complete information object that may embody text, images, sound, and alternative transmission content. CDA will hold any reasonably clinical information that enclosed in every patient’s anamnesis like discharge outline following patient’s care history & physical specialist reports like those for medical imaging or pathology. Electronic Health Record helps improve patient safety and quality of care; however, it`s the necessity of interoperability between health data exchange at completely different hospitals. CDA document generation and integration Open API service supported cloud computing, through that hospital`s area allowed to handily generate CDA documents whereas not having to buy proprietary code software. The CDA document integration system integrates multiple CDA documents per patient into one CDA document and doctor and patients can browse the clinical information in chronological order. In this, the CDA document generation and integration depend on cloud computing and so the service is gettable in Open API. Developers using totally different platforms thus can use this system to increase ability. It providing security to the CDA document and unique identity (id) is generated and given to the patients for avoiding the interchanging and duplication of medical reports. Every detail in CDA Document is Encrypted and stored in the Database. All Details in CDA Document is secured utilizing different Security Algorithms
Key-Words / Index Term
Health Information System (HIS), Infrastructure as a Services, Cloud Computing, Health Level 7 (HL7), Electronic Health Record (EHR).
References
[1] K. Ashish, “Meaningful use of electronic health records the road ahead,”JAMA, vol. 304, no. 10, pp. 1709–1710, 2010.
[2] J. D. D’Amore, D. F. Sittig, A. Wright, M. S. Iyengar, and R. B. Ness, “The promise of the CCD: Challenges and opportunity for quality improvement and population health,” in Proc. AMIA Annu. Symp. Proc., pp. 285–294, 2011.
[3] M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “A view of cloud computing,” Commun. ACM, vol. 53, no. 4, pp. 50–58, 2010.
[4] S. Lee, J. Song, and I. Kim, “Clinical document architecture integration system to support patient referral and reply letters,” Health Informat. J., Published online before print Jun. 2014.
[5] S. R. Simon, R. Kaushal, P. D. Cleary, C. A. Jenter, L. A. Volk, E. G. Poon, E. J. Orav, H. G. Lo, D. H. Williams, and D. W. Bates, “Correlates of electronic health record adoption in office practices: A statewide survey,” J. Am. Med. Inform. Assoc., vol. 14, pp. 110–117, 200.
[6] J. L€ahteenm€aki, J. Lepp€anen, and H. Kaijanranta, “Interoperability of personal health records,” in Proc. IEEE 31st Annu. Int. Conf. Eng. Med. Biol. Soc., pp. 1726–1729, 2009.
[7] S. Kikuchi, S. Sachdeva, and S. Bhalla, “Applying cloud computing model in PHR architecture,” in Proc. Joint Int. Conf. Human-Centered Comput. Environments, pp. 236–237, 2012.
[8] M. Eichelberg, T. Aden, J. Riesmeier, A. Dogac, and Laleci, “A survey and analysis of electronic healthcare record standards,” ACM Comput. Surv., vol. 37, no. 4, pp. 277–315, 2005.
[9] C. Martınez-Costa, M. Menarguez-Tortosa, and J. Tomas Fernan-dez-Breis, “An approach for the semantic interoperability of ISO EN 13606 and OpenEHR archetypes,” J. Biomed. Inform., vol. 43, no. 5, pp. 736–746, Oct. 2010.
[10] M. L. Muller,€ F. Ǖckert, and T. Burkle,€ “Cross-institutional data exchange using the clinical document architecture (CDA),” Int. J. Med. Inform., vol. 74, pp. 245–256, 2005.
[11] R. H. Dolin, L. Alschuler, C. Beebe, P. V. Biron, S. L. Boyer, D. Essin, E. Kimber, T. Lincoln, and J. E. Mattison, “The HL7 Clinical Document Architecture,” J. Am. Med. Inform. Assoc., vol. 8,pp. 552–569, 2001.
[12] K. Huang, S. Hsieh, Y. Chang, F. Lai, S. Hsieh, and H. Lee, “Application of portable cda for secure clinical-document exchange,” J. Med. Syst., vol. 34, no. 4, pp. 531–539, 2010.
[13] S. Lee, J. Song, and I. Kim, “Clinical document architecture integration system to support patient referral and reply letters,” Health Informat. J., Published online before print Jun. 2014.
[14] J. Walker, E. Pan, D. Johnston, J. Adler-Milstein, D. W. Bates, and B. .Middleton, “The value of health care information exchange and interoperability,” in Proc. Health Aff., pp. 10–18, 2005.
[15] E. W. Huang, T. L. Tseng, M. L. Chang, M. L. Pan, and D. M. Liou, “Generating standardized clinical documents for medical infor-mation exchanges,” in Proc. IT Pro., pp. 26–32, 2010.
[16] P. C. Tang, J. S. Ash, D. W. Bates, J. M. Overhage, and D. Z. Sands, “Personal health records: Definitions, benefits, and strategies for overcoming barriers to adoption,” J. Am. Med. Inform. Assoc., vol. 13, no. 2, pp. 121–126, 2006.
[17] Y. Kwak, “International standards for building electronic health record (ehr),” in Proc. Enterprise Netw. Comput. Healthcare Ind., 18–23, Jun. 2005.
Citation
Komal R. Jadhav, Nitin N. Patil, "Clinical Document Architecture (CDA) Generation and Integration for Health Data Exchange based on Cloud Computing: A Survey," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.801-805, 2019.
Cylindrical Dielectric Resonator Optical Antenna (CDROA) & its Applications for Convenient Technology
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.806-809, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.806809
Abstract
The unique and special features of Dielectric Resonator Antenna (DRA) which has mainly focus on good quality communication with low profile Antenna. Cylindrical Dielectric Resonator optical Antenna (CDROA) is compact in structure, light in weight conformable to surface planar some natural carbon atom form hollow cylinder with out side diameter of only one nano meter. Dielectric Resonator Antenna is well suited for microwave devices integration and feeding Technique and, especially with the microwave integrated circuit technology. In addition, technological applications for such as direct broadcast Technique for satellite system on satellite communication at global positioning system (GPS) and high frequency navigation system and good accuracy and a large variety of radar systems demand for good quality Antenna for the best performance of antenna system
Key-Words / Index Term
DRA, Global positioning system (GPS) Antenna, satellite, Cylindrical dielectric resonator antennas (CDRA)
References
[1]. Anand Mohan, The advanced generation mobile broadband technology for wireless communication system and its applications, International, Journal of Applied Research 2015; 1(12): 383-385
[2]. Gaurav Varshney, Anoop Kumar Verma, Shailesh Kr. Singh,”Ultra Wide Band Dielectric Resonator Antenna for Wireless Communication” International Journal of Imerging Technology and Advanced Engineering (ICADET-14) Volume 4, Special Issue 1, February 2014)
[3]. Raghvendra Kumar Chaudhary, Kumar Vaibhav Srivastava and Animesh Biswas, “Four Element Multilayer Cylindrical Dielectric Resonator Antenna Excited by a Coaxial Probe for Wideband Applications” IEEE Communications (NCC), 2011 National Conference on, pp. 1-5, ISBN-978-1-61284-090-1, 2011.
[4]. J. Q. Howell, “Microstrip antennas,” in Dig. IEEE Int. Symp. Antennas Propagation, Dec. 1972, pp. 177–180.
[5]. R. E. Munson, “Conformal microstrip antennas and microstrip phased arrays,” IEEE Trans. Antennas Propagat., vol. 22, no. 1, pp. 74–78, 1974.
[6] R. Garg, P. Bhartia, I. Bahl, and A. Ittipiboon, Microstrip Antenna Design Handbook. Norwood, MA: Artech House, 2001.
[7]. C. Kumar and D. Guha, “Nature of cross-polarized radiations from probefed circular microstrip antennas and their suppression using different geometries of defected ground structure (DGS),” IEEE Trans. Antennas Propagat., vol. 60, no. 1, pp. 92–101, Jan. 2012
[8]. Makwana, G. D. and K. J. Vinoy, “A microstrip line fed rectangular dielectric resonator antenna for WLAN Application,“Proceeding of IEEE Internation symposium on microwave, 299-303, Dec. 2008
[9]. Petosa, A. and A. Ittipiboon, Dielectric resonator antennas: A historical review and the current state of the art," IEEE Antennas and Propag. Mag., Vol. 52, 2010.
[10]. Wong, H., K. B. Ng, C. H. Chan, and K. M. Luk, Printed antennas for millimeter wave application," International Workshop on Antenna Tech., 411{414, 2013.
[11]. Chin, K. S., H. T. Chang, J. A. Liu, et al., 28-GHz patch antenna arrays with PCB and LTCC substrates," Cross Strait Quad-Regional Radio Science and Wireless Technology Conference, Vol. 1,355358, 2011.
[12]. Mohan, Study of Plasmonic Nano Antennas and Their Optimization; International Journal of Emerging Research in Management &Technology; ISSN: 2278-9359 (Volume-5, Issue-5); May 2016
Citation
Anand Mohan, Ashok Kumar, "Cylindrical Dielectric Resonator Optical Antenna (CDROA) & its Applications for Convenient Technology," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.806-809, 2019.
Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.810-817, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.810817
Abstract
The volume of wallet payment transactions has considerably increased in the last decade. There are many wallets already has been developed and also new wallets coming in the market day by day for payment transactions in highly distributed environments. So far it has the focus on addressing only security issues. However, key important criteria of distributed processing such as performance, scalability, and availability. In this paper, we identify and analyze the different threats and vulnerabilities of a mobile cum web wallet application to obtain a high-level understanding of the various types of threats that may affect wallet applications with its possible security measures
Key-Words / Index Term
e-cash, mobile payment system, mobile wallet
References
[1] Dahlberg, Tomi, Niina Mallat, and Anssi Öörni. "Trust enhanced technology acceptance model-consumer acceptance of mobile payment solutions: Tentative evidence." Stockholm Mobility Roundtable 22 (2003): 23.
[2] Hoofnagle, Chris Jay, Jennifer M. Urban, and Su Li. "Mobile payments: Consumer benefits & new privacy concerns." (2012).
[3] Kasiyanto, Safari. "Security Issues of New Innovative Payments and Their Regulatory Challenges." In Bitcoin and Mobile Payments, pp. 145-179. Palgrave Macmillan UK, 2016.
[4] Khiaonarong, Tanai. "Oversight issues in mobile payments.", IMF Working Paper (July 2014).
[5] Hohl, Fritz. "Time limited blackbox security: Protecting mobile agents from malicious hosts." Mobile agents and security (1998): 92-113.
[6] Simplot-Ryl, Isabelle, Issa Traoré, and Patricia Everaere. "Distributed architectures for electronic cash schemes: a survey 1." International Journal of Parallel, Emergent and Distributed Systems 24, no. 3 (2009): 243-271.
[7] Security of Mobile Payments and Digital Wallets, ENISA December 2016, https://www.enisa.europa.eu/publications/mobile-payments-security/at_download/fullReport
[8] Allen, Hellen, 2003, “Innovations in Retail Payments: E-Payments”, Bank of England Quarterly Bulletin, Winter, pp. 428-438.
[9] Diniz, Eduardo Henrique, João Porto de Albuquerque, and Adrian Kemmer Cernev. "Mobile Money and Payment: a literature review based on academic and practitioner-oriented publications (2001-2011)." (2011).
[10] Urban, Jennifer. 2016. “Mobile Payments: Consumer Benefits & New Privacy Concerns”. SocArXiv. July 18. osf.io/preprints/socarxiv/7pnxz.
[11] Papathanasiou, Christian, and Nicholas J. Percoco. "This is not the droid you`re looking for..." Def Con 18 (2010).
[12] Davis, Michael, Sean Bodmer, and Aaron LeMasters. Hacking Exposed Malware and Rootkits. McGraw-Hill, Inc., New York, NY, USA, 2009.
[13] The Great Bank Robbery: Carbanak APT https://business.kaspersky.com/the-great-bank-robbery-carbanak-apt/3598/
[14] FIDO Alliance, “Specifications Overview”, http://fidoalliance.org/specifications/overview/
[15] https://en.wikipedia.org/wiki/Mobile_payment
[16] European Central Bank, “Recommendations For The Security of Mobile Payments”, https://www.ecb.europa.eu/paym/cons/pdf/131120/ recommendationsforthesecurityofmobilepaymentsdraftpc201311en.pdf
[17] ENISA,” Mobile Identity Management”, https://www.enisa.europa.eu/publications/Mobile%20IDM
[18] Drop Labs, “Rampant: Explaining the Current State of Apple Pay Fraud”, http://www.droplabs.co/?p=1231
[19] Apple, “About EMV and Apple Pay for Merchants”, https://support.apple.com/en-us/HT205645
[20] ISACA, ”2015 Mobile Payment Security Study”, https://www.isaca.org/Pages/mobile-payment-security-study.aspx
[21] Mobile Payment in Your Business", https://www.intelligenthq.com/resources/the-3-biggest-benefits-of-implementing-mobile-payment-in-your-business/
[22] Salvador Mendoza, “Samsung Pay: Tokenized Numbers, Flaws and Issues”, https://www.blackhat.com/docs/us-16/materials/us-16-Mendoza-Samsung-Pay-Tokenized-Numbers-Flaws-And-Issues-wp.pdf
[23] Zvelo, “Google Wallet Security: PIN Exposure Vulnerability”, https://zvelo.com/google-wallet-security-pin-exposure-vulnerability/
[24] Wonder How To, “ Apple Watch Vulnerability Lets Thieves Use Apple Pay Without Your PIN”, http://ios.wonderhowto.com/how-to/apple-watch-vulnerability-lets-thieves-use-apple-pay-without-your-pin-0161940/
[25] http://viaforensics.com/mobile-security/forensics-security-analysis-google-wallet.html
[26] MIT Technology Review, “Is Google Wallet Safe ?”, https://www.technologyreview.com/s/426921/is-google-wallet-safe/
[27] Choi, Daeseon, and Younho Lee. "Eavesdropping One-Time Tokens Over Magnetic Secure Transmission in Samsung Pay." In WOOT. 2016.
[28] Trend Micro Discovers MalumPoS; Malware Targeting Hotels and other US Industries http://blog.trendmicro.com/trendlabs-security-intelligence/trend-micro-discovers-malumpos-targets-hotels-and-other-us-industries/
[29] https://www.goodreturns.in/classroom/2016/11/types-mobile-wallets-their-difference-518655.html
[30] http://www.dqindia.com/top-6-mobile-wallets-in-india/2/
[31] http://www.iamwire.com/2016/11/list-of-mobile-wallets-upi-payment-apps-in-india/145172
Citation
Mansi Bosamia, Dharmendra Patel, "Wallet Payments Recent Potential Threats and Vulnerabilities with its possible security Measures," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.810-817, 2019.
Social Media and Indian Youth
Survey Paper | Journal Paper
Vol.7 , Issue.1 , pp.818-821, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.818821
Abstract
At present Social Media is a part of life for most of the Indian youth. The usage of the Internet is now heavily shifted to Social Media Sites. Undoubtedly Social Media has its own merits, but excessive use of Social Media is affecting the lifestyle of youth moreover, statistics show that addiction to social media resulted in increased health problems and change in behavior. Most of the previous work done in this field relates to foreign countries. This paper focus on the Impact of Social Media Sites on youth, good, bad & major concerns in Indian perspective
Key-Words / Index Term
Social Media, Impact, Indian Youth, Influence of Social Media, Internet
References
[1] M. A. Devmane and N. K. Rana, "Usability trends and access of Online Social Network by Indian population and its analysis" International Conference on Nascent Technologies in the Engineering Field, Navi Mumbai, pp. 1-5. 2015
[2] Nandi, “A Survey on Using Data Mining Techniques for Online Social Network Analysis” International Journal of Computer Science Issues. 10. pp. 162, 2013
[3] A. A. Sattikar, Dr. R. V. Kulkarni “A Review of Security and Privacy Issues in Social Networking” International Journal of Computer Science and Information Technologies, Vol. 2 (6) , 2784-2787, 2011
[4] Parvathy J, Suchithra R, “Impact of Usage of Social Networking Sites on Youth”, International Journal of Computer Applications (0975 – 8887) Volume 129 – No.3, 2015
[5] D. G. Rai, “Impact of Social Networking Sites (SNSs): Are Youth affected by its usage?” Issues and Ideas in Education, vol. 5, no. 1, pp. 11–24, 2017.
[6] T. Dilci and A. K. Eranıl, “The Impact of Social Media on Children,” Handbook of Research on Children`s Consumption of Digital Media Advances in Human and Social Aspects of Technology, pp. 1–10, 2018
[7] E. A. Zaky, “Adolescence; a Crucial Transitional Stage in Human Life,” OMICS International, 2017.
[8] L. Fang and L. Ha, “Do College Students Benefit from Their Social Media Experience?” Advances in Human and Social Aspects of Technology Human Behavior, Psychology, and Social Interaction in the Digital Era, pp. 259–278, 2015.
[9] S. Siddiqui and T. Singh, “Social Media its Impact with Positive and Negative Aspects,” International Journal of Computer Applications Technology and Research, vol. 5, no. 2, pp. 71–75, 2016.
[10] Anderson, Monica, and Jingjing Jiang “Teens, Social Media & Technology 2018.” Pew Research Center: Internet, Science & Tech, Pew Research Center: Internet, Science & Tech, 2018,
[11] Tian, S. W., Yu, A. Y., Vogel, D., & Kwok, R. C-W. “The impact of online social networking on learning: A social integration perspective”. International Journal of Networking and Virtual Organisations, vol 8(3-4), pp 264-280. , 2011.
[12] Gorry, G. Anthony, “Empathy in a Virtual World.” SSRN Electronic Journal, 2009.
[13] R. Kumar and P. Agrawal (2017), “Impact of social media in the present scenario,” Pranjana: The Journal of Management Awareness, vol. 20, no. 1, p. 31, 2017.
[14] Fisoun, V., Floros, G., Siomos, K., Geroukalis, D., & Navridis, K. (2012). “Internet Addiction as an Important Predictor in Early Detection of Adolescent Drug Use Experience—Implications for Research and Practice.”, Journal of Addiction Medicine, vol 6(1), pp 77–84, 2012
[15] Andreassen, Cecilie Schou, “Online Social Network Site Addiction: A Comprehensive Review.” Current Addiction Reports, vol. 2, no. 2, pp. 175–184, 2015
[16] D. S. Gouse, “Privacy Circles: Sharing Images on Social Networking Sites Using A3P,” International Journal Of Engineering And Computer Science, 2016.
[17] K. Sadiq, “Social media - The antisocial media, its challenges and impact on mental health,” Journal of Neurology & Neurophysiology, vol. 09, 2018.
[18] Singh, Monica & Amiri, Mohammad & Sabbarwal, Sherry.”Social Media Usage: Positive And Negative Effects On The LifeStyle Of Indian Youth.”, pg 5. ,2017
[19] He Q, Turel O, Bechara A (2017), “Brain anatomy alterations associated with Social Networking Site (SNS) addiction”, Sci Rep 7, 45064, 2017
Citation
Vikramaditya Singh Bhati, Jayshri Bansal, "Social Media and Indian Youth," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.818-821, 2019.
A Perspective Study on Network Intrusion Detection System Using Various Approaches
Review Paper | Journal Paper
Vol.7 , Issue.1 , pp.822-825, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.822825
Abstract
With the increasing demand on automation and computers, one of the chief issues in the present decade has been to build a secure network, to prevent against malicious activities on the network. The process which monitors and analyzes the communication of network and detects intrusion and anomalies is termed as Intrusion Detection System (IDS). By handling such huge voluminous network traffic-based IDS also creates new issues. To overcome this, many statistics, machine learning and artificial intelligence-based approaches were started evolving. This paper focuses on the importance of such techniques in the field of intrusion detection by performing detailed survey. It presents a general overview of IDS, types of IDs and various methods used for classification. It also describes the several methods and the importance of IDSs in information security
Key-Words / Index Term
Intrusion Detection System, Machine Learning, Artificial Intelligence, Statistics, Data mining and Neural Networks
References
[1] Kumar, S, Yadav A, Increasing Performance Of Intrusion Detection System Using Neural Network, Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on, p546-550, May 2014.
[2] Aljurayban, N.S.; Emam, A. Framework for Cloud Intrusion Detection System Service, Web Applications and Networking (WSWAN), 2nd World Symposium, pp 1-5, 2015
[3] Jiefei Ma; Le, F.; Lobo, J.; Russo, A, Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks. Computer Communications (INFOCOMIEEE Conference on, p558-566, 2015
[4] Anazida Zainal, Mohd Aizaini Maarof and Siti Mariyam Shamsuddin “Data Reduction and Ensemble Classifiers in Intrusion Detection” in 2008 IEEE.
[5] Guangqun Zhai, Chunyan Liu “Research and Improvement on ID3 Algorithm in Intrusion Detection System” in 2010 IEEE.
[6] Jorge Blasco, Agustin Orfila, Arturo Ribagorda “Improving Network Intrusion Detection by Means of Domain-Aware Genetic Programming” DOI 10.1109/ARES.2010.53 in IEEE 2010.
[7] Ahmed Youssef and Ahmed Emam “Network Intrusion Detection using Data Mining and NetworkBehavior Analysis” International Journal of Computer Science & Information Technology (IJCSIT) Vol 3, No 6, Dec 2011.
[8] Mohd. Junedul Haque, Khalid.W. Magld, Nisar Hundewale “An Intelligent Approach for Intrusion Detection Based on Data Mining Techniques” in 2012 IEEE.
[9] S. Devaraju, S .Ramakrishnan “Detection of Accuracy for Intrusion Detection System using Neural Network Classifier” International Journal of Emerging Technology and Advanced Engineering( ISSN 2250-2459 (Online), An ISO 9001:2008 Certified Journal, Volume 3, Special Issue 1, January 2013).
[10] S.A.Joshi, Varsha S.Pimprale “Network Intrusion Detection System (NIDS) based on Data Mining” International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 2, Issue 1, January 2013.
[11] G. Mageswary1 , Dr. M. Karthikeyan2 Intrusion Detection Using Data Mining Techniques International Journal of Engineering Science Invention (IJESI) ISSN (Online): 2319 – 6734, ISSN (Print): 2319 – 6726 www.ijesi.org || PP. 20-25
[12] Helman, Paul, Liepins, Gunar, and Richards, Wynette, "Foundations of Intrusion Detection," The IEEE Computer Security Foundations Workshop V, 1992
[13] J. Shun and H. A. Malki, "Network Intrusion Detection System Using Neural Networks," 2008 Fourth International Conference on Natural Computation, Jinan, 2008, pp. 242-246.
[14] Butun, Ismail; Morgera, Salvatore D.; Sankar, Ravi (2014). "A Survey of Intrusion Detection Systems in Wireless Sensor Networks". IEEE Communications Surveys & Tutorials
[15] Mostaque Md. Morshedur Hassan,” Network Intrusion Detection System Using Genetic Algorithm and Fuzzy Logic”, IJIRC2013.
[16] Prabhdeep Kaur, Sheveta Vashisht ”Mingle Intrusion Detection System Using Fuzzy Logic”, IJEAT 2013.
Citation
K. Soundarraj, M. Ravichandran, "A Perspective Study on Network Intrusion Detection System Using Various Approaches," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.822-825, 2019.
Study on Water quality of Narmada River by analyzing physicochemical and biological parameters using random forest model
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.826-831, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.826831
Abstract
Rivers are most important recourse for consumption as freshwater for human being. The quality of water resource can be measured and indentified by its physicochemical and biological parameters. This paper presents a study of water quality of River Narmada through analysis of some of its selected physicochemical and biological parameters. For this study, secondary dataset with 7 water quality parameters collected during years from 1990 to 2012 of River Narmada of Hoshangabad district of Madhya Pradesh has been used. The objective of this study to assess the quality of water of Narmada River in comparison with Surface Water Quality Standards for Indian Rivers. For this assessment, one of algorithm of data mining called random forest is used which is incorporate as built in model of an analytical tool called Rapid Miner. This study show that quality of river water is not favorable and goes down day by day due to domestic and industrial effluents mixing in the river at town. The finding of this study gives definitely an alert message to water resource managers for the improvement of water quality management by proper treatment and monitoring the River.
Key-Words / Index Term
Water Quality, Narmada River, Classification, Random Forest model
References
[1] Sharma Deepshikha, Kansal Arun, “Water Quality analysis of River Yamuna using water quality index in the national capital territory India”, Appl. Water Science, Vol. 1, pp. 147-157, 2011.
[2] Mohamad Ali Fulazzaky, ” Water Quality Evaluation System to Assess the Brantas River Water”, Water Resour Manage, Vol.23, pp.3019–3033, 2009.
[3] Sharma Shraddha, Vishwakarma Rakesh, Dixit Savita and Jain Praveen,” Evaluation of Water Quality of Narmada River with reference to Physicochemical Parameters at Hoshangabad city, MP, India “, Vol. 1,Issue 3, pp.40-48,2011.
[4] Gour Sanjeev ,Gour Mamta,” Neural Network Approach In Water Quality Data Analysis For The River Narmada”, Binary Journal of Data Mining & Networking, Vol. 4, pp. 49-53, 2014.
[5] Soni Virendra, Khwaja Salahuddin and Visavadia Manish, “Preimpoundmental studies on Water Quality of Narmada River of India”, International Research Journal of 12 Environment Sciences, Vol. 2,Issue 6, pp.31-38, 2013.
[6] Shailesh Jaloree, Anil Rajput, Sanjeev Gour,” Decision tree approach to build a model for water quality”, Binary Journal of Data Mining & Networking, Vol. 4,pp.25-28,2014.
[7] Report, Central Water Commission (CWC),” Integrated Water Hydrological book”, Narmada Basin Organization Bhopal. September 2009.
[8] Singh Pawan and Shrivastava Pradeep, “Analysis of Water Quality of River Narmada”, International Journal of Current Research, Vol 7,Issue 12, pp. 24073-24076, 2015.
[9] Jaloree Shailesh, Gour Mamta, Gour Sanjeev,” Water Quality Assessment using Association Rule Mining for River Narmada”, Indian Journal of Science and Technology, Vol 9,Issue 10 ,pp.1-5, 2016.
[10] Kushram Parvati,” Physico-chemical studies on Narmada River water at Dindori (M.P.) India”, International Journal of Applied Research, Vol.2,Issue 2, pp. 226-228, 2016.
[11] Jain Dilip, Rahi D.C, Verma Shailza, “ Assessment of Water Quality Status by Using Water Quality Index (WQI) Method in Narmada River in Jabalpur Madhya Pradesh”, International Journal for Scientific Research & Development, Vol.4,Issue 12, pp.122-124,2017
[12] Katakwar Mukesh,” Water quality and pollution status of Narmada river s Anjan Tributary in Madhya Pradesh, India” , International journal of current Research an Academic Review, Vol. 2,Issue 11, pp. 93-98, 2014.
[13] Report, “Surface Water Quality Standards” (as per IS: 2296), Chapter-6, Table 9.1 pp.245-252 and Central Pollution Control Board, 2007-08.
Citation
Sanjeev Gour, Mamta Gour, "Study on Water quality of Narmada River by analyzing physicochemical and biological parameters using random forest model," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.826-831, 2019.
An optimized algorithm for association rule hiding technique using Hybrid Approach
Research Paper | Journal Paper
Vol.7 , Issue.1 , pp.832-836, Jan-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i1.832836
Abstract
Data mining is basically a process of identifying different patterns from huge amount of data. Association rule hiding technique target to find out dependency relationships transversely attributes. It may reveal sensitive information. With widespread applications of data mining techniques to diverse domains, privacy preservation becomes compulsory. Association rule hiding is one of the important techniques of privacy preserving data mining to keep the sensitive association rules generated by association rule mining. In this paper we talk about heuristic approach for hiding sensitive rules. The proposed technique provides us solution of privacy disclosure and hides the sensitive rules.
Key-Words / Index Term
Association Rule Hiding, Data Mining, Privacy Preserving Data Mining, Distortion, Representative Rule.
References
[1] Masooda Modaka,Rizwana Shaikhb.” Privacy Preserving Distributed Association Rule Hiding Using Concept Hierarchy”, 7th International Conference on Communication, Computing and Virtualization 2016. Procedia Computer Science 79 (2016)993–1000.
[2] Putri, A walia W. Laksmiwati Hira.” Hybrid Transformation in Privacy-Preserving Data Mining” 978-1-5090-5671-2/16/$31.00 ©2016 IEEE.
[3] Mohamed Refaat Abdellah H. Aboelseoud ’
Khalid Shafee M. Badr Senousy “Privacy Preserving Association Rule Hiding Techniques: Current Research Challenges” International Journal of Computer Applications (0975 – 8887) Volume 136 – No.6, February 2016.
[4] Kasthuri S1 and Meyyappan T2 “Hiding Sensitive Association Rule Using Heuristic Approach”, International Journal of Data Mining & Knowledge Management Process (IJDKP) Vol.3, No.1, January 2013DOI.
[5] Umesh Kumar Sahu Anju Singh “Approaches for Privacy Preserving Data Mining by Various Associations Rule Hiding Algorithms – A Survey”, International Journal of Computer Applications (0975 – 8887) Volume 134 – No.11, January 2016.
[6] Khyati B. Jadav, Jignesh Vania Dhiren R. Patel, Ph.D “A Survey on Association Rule Hiding Methods”, International Journal of Computer Applications (0975 – 8887) Volume 82 – No 13, November 2013.
[7] K. Naga Prasanthi “A Review on Privacy Preserving Data Mining Techniques” International Journal of Advanced Research in Computer Science and Software Engineering Volume 6, Issue 3, March 2016.
[8] Vinita Shah Divya C. Kalariya Jay Vala “Association Rule Hiding based on Heuristic Approach by Deleting Item at R.H.S. Side of Sensitive Rule”, International Journal of Computer Applications (0975 – 8887) Volume 122 –No.8, July 2015.
[9]Ruchi.P.Kanekar1, Prof. Rachel Dhanaraj2 “Adding Dummy Items To Hide Sensitive Association Rules” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727 PP 06-10”
[9] Xueyun Li Zheng Yan Peng Zhang “A Review on Privacy-Preserving Data Mining”, December 2014.
[10]Mrs. Geeta S. Navale Dr. Suresh N. Mali “A Survey on Sensitive Association Rules Hiding Methods”, 978-1-5386-4008-1/17/$31.00 ©2017 IEEE.
[11]Melissa Fernandes Joanne Gomes “Heuristic Approach for Association Rule Hiding using ECLAT”, 978-1-5090-4381-1/17/$31.00 © 2017 IEEE
[12] Apoorva Joshi,, Pratima Gautam “A survey on Sanitizing Methods in Association Rule Hiding Technique” International Journal Of Scientific Research in Computer science, Engineering and Information Technology” ,volume2 Issue 6 2017.
[13] Li Jingquan. "Privacy-Enhancing Data Mining: Issues, Techniques and Measures". University of Illinois, United State of America, 2004.
[14] Xingyu Geng BP., Zhang J. "Combined Data Distortion Strategies for Privacy-Preserving Data Mining". Southwest Petroleum University, China and University of Kentucky, United States of America. 2010.
[15] Jajodia., C.F.a.S., The inference problem: A survey, in SIGKDD Exploration Newsletter. 2002. p. 6-11.
[16] A. Parmar, U.P.R., D. R. Patel. “Blocking based approach for classification Rule hiding to Preserve the Privacy in Database”. In proceedings of International Symposium on Computer Science and Society, IEEE 2011.
[17] Animesh Tripathy, M.P. “A novel framework for preserving privacy of data using correlation analysis”. In Proceedings of the International Conference on Advances in Computing, Communications and Informatics (ICACCI `12). ACM. 2012. NY, USA.
[18] Gkoulalas-Divanis and V.S.Verykios, “An Integer Programming Approach for Frequent Itemset Hiding”, In Proc. ACM Conf. Information and Knowledge Management (CIKM’06), Nov. 2006
[19] Y. Li, M. Chen, Q. Li, and W. Zhang, “Enabling multilevel trust in privacy preserving data mining,” IEEE Transactions on Knowledge and Data Engineering, vol.24, pp.1598-1612, 2012.
[20] Gkoulalas-Divanis and V.S. Verykios, “Exact Knowledge Hiding through Database Extension,” IEEE Transactions on Knowledge and Data Engineering, vol. 21(5), May 2009, pp. 699-713.
Citation
Apoorva Joshi, Pratima Gautam, "An optimized algorithm for association rule hiding technique using Hybrid Approach," International Journal of Computer Sciences and Engineering, Vol.7, Issue.1, pp.832-836, 2019.