Internet of Things: Architecture, Security and Cryptdb : Monomi
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.47-49, Jan-2019
Abstract
Cloud users demands security to their data which are stored in data repositories of cloud service provider. Thus the concept of Network Security can be applied over the cloud network, where several encryption algorithms are applied to provide integrity on the data. Such algorithms include Symmetric encryptions, Asymmetric encryptions, Hashing algorithms and Digital signatures. MONOMI is a system for securely executing analytical workloads over sensitive data on an untrusted database server. MONOMI works by encrypting the entire database and running queries over the encrypted data. CryptDB is a MySQL proxy that allows SQL aware encryption inside existing database management systems. To offer the best possible protecting while enabling the greatest computational flexibility it relies on a new concept called onions, where different layers of encryption are wrapped around each other and are only revealed as necessary. While its concept to improve database security looks fresh and interesting from an academic standpoint we wanted to examine the usability in practical application to determine if a real world productive use is desirable.
Key-Words / Index Term
Security, Internet of things, Crypt DB, Monomi
References
[1]. D. J. Abadi, S. R. Madden, and N. Hachem. Column-stores vs. rowstores: how different are they really? In Proc. of SIGMOD, pages 967–980, Vancouver, Canada, June 2008.
[2]. S. Agrawal, S. Chaudhuri, and V. R. Narasayya. Automated selection of materialized views and indexes in SQL databases. In Proc. of the 26th VLDB, pages 496–505, Cairo, Egypt, Sept. 2000.
[3]. A. Arasu, S. Blanas, K. Eguro, R. Kaushik, D. Kossmann, R. Ramamurthy, and R. Venkatesan. Orthogonal security with Cipherbase. In Proc. of the 6th CIDR, Asilomar, CA, Jan. 2013.
[4]. S. Bajaj and R. Sion, “TrustedDB: A Trusted Hardware Based Database with Privacy and Data Confidentiality,” Proc. ACM SIGMOD Int’l Conf. Management of Data (SIGMOD ’11), pp. 205-216, 2011.
[5]. S. Bajaj and R. Sion, “TrustedDB: A Trusted Hardware Based Outsourced Database Engine,” Proc. Int’l Conf. Very Large DataBases (VLDB), 2011.
[6]. D. Bogdanov et al. A universal toolkit for cryptographically secure privacy-preserving data mining. In PAISI, 2012.
[7]. F. Emek_ci and D. Agrawal et al. Privacy preserving query processing using third parties. In ICDE, 2006.
[8]. C. Gentry. Fully homomorphic encryption using ideal lattices. In STOC, 2009.
[9]. C. Gentry et al. Fully homomorphic encryption with polylog overhead. In EUROCRYPT, 2012.
[10]. O. Goldreich, S. Micali, and A. Wigderson. How to play any mental game. In STOC, 1987.
[11]. Stephen Tu, M. Frans Kaashoek, Samuel Madden, and Nickolai Zeldovich. 2013. Processing Analytical Queries Over Encrypted Data. In Proceedings of the Conference on Very Large Data Bases (VLDB).
[12]. Vlado Altmann, Jan Skodzik, Frank Golatowski, and Dirk Timmermann. “Investigation of the use of embedded Web Services in smart metering applications”. In: Conference on IEEE Industrial Electronics Society. IECON. Oct. 2012, pp. 6172–6177. DOI: 10.1109/IECON.2012.6389071.
[13]. Sven Bendel et al. “A service infrastructure for the Internet of Things based on XMPP”. In: Int. Conference on Pervasive Computing and Communications Workshops. PERCOM Workshops. Mar. 2013, pp. 385–388. DOI: 10.1109/PerComW.2013.6529522.
[14]. SHEN changxiang, ZHANG Huanguo and FENG Dengguo, “Literature Review of Information Security” Science in China (Series E: Information Sciences), vol.37, no.2, 2007, pp.129-150 WU chuankun, “A Preliminary Investigation on the Security Architecture of the Internet of Things,” Bulletin of Chinese Academy of Sciences, vol 25,no. 4, 2010, pp 411-419.
Citation
G. Ambika, P. Srivaramangai, "Internet of Things: Architecture, Security and Cryptdb : Monomi", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.47-49, 2019.
Fuzzy Decision Trees as a Decision Making Framework in the Private Sector
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.50-57, Jan-2019
Abstract
Systematic approaches to making decisions in the private sector are becoming very common. Most often, these approaches concern expert decision models. The expansion of the idea of the development of e-participation and e-democracy was influenced by the development of technology. The solution presented in this papers concerns fuzzy decision making framework. This framework combines the advantages of the introduction of the decision making problem in a tree structure and the possibilities offered by the flexibility of the fuzzy approach. The possibilities of implementation of the framework in practice are introduced by case studies of investment projects appraisal in a community and assessment of efficiency and effectiveness of private sector.
Key-Words / Index Term
Decision tree, Appraisal tree, Fuzzy set, Decision making, private sector
References
[1] Bencina, J., “The use of fuzzy logic in coordinating investment projects in the public sector”, The proceedings of Rijeka Faculty of Economics-Journal of Economics and Business,25(1)(2007)113-136.
[2] Bonissone, p.p. and Decker, K.S., “Selecting uncertainty calculi and granularity: an experiment in trading off precision and complexity”, in : Kanal, L.N., Lemmer, J.F. (eds) uncertainty in Artificial intelligence, Machine intelligence and pattern Recognition Elsevier Science Publisher B.V., Amsterdam 4 (1986) 217 – 247.
[3] Chen, K.Y., Sheu, D.D., and Liu, C.M., “Vague knowledge search in the design for out sourcing using fuzzy decision tree”, computers & operations research, 34 (2007) 3628-3637.
[4] GAO/ AIMD – 98-110, leading practices in capital Decision – Making, Washington: U.S. General Accounting office, 1998.http://www.gao.gov/special.pubs/ai99032.pdf, accessed May, 2004.
[5] Gammack, J., and Barker M., E-Democracy and public participation: A Global overview of policy and activity, school of management, Griffith university Queensland, 2003,
[7] Kapalan, R.S., and Norton, D.P., The balanced scorecard: translating strategy into action, Harvard Business school press, Boston, 1996.
[8] Olaru, C., and Wehenkel, L., “A complete fuzzy decision tree technique”, Fuzzy sets and systems, 138(2) (2003) 221- 254.
[9] Quinlan, J.R., “Decision trees and decision making”, IEEE Transactions on systems, Man and cybernetics, 20(2) (1990) 339-346.
[10] Tran, L., and Duckstein, L., “Comparison of fuzzy numbers using a fuzzy distance measure”, Fuzzy sets and systems, 130 (2002) 331-341.
[11] Yuan Y., and Shaw, M.J., Introduction of fuzzy decision trees”, Fuzzy sets and systems, 69(2) (1995), 125-139.
[12] Zadeh, L.A., “Fuzzy sets”, Information and control, 8 (1965) 338-353.
[13] Zadeh, L.A., “The concept of a linguistic variable and its application approximate reasoning”, Information sciences, 8(1975) 301-357.
[14] Zimmerman, H.J., Fuzzy sets theory and its applications, Kulver Academic publishers, Boston/Dord recht/ London, 2001.
[15] Mary Beth Corrigan, Ten principles for successful public/ private partnerships (Washington, DC: ULI, 2005).
Citation
M. Vijaya, M. Arthi, "Fuzzy Decision Trees as a Decision Making Framework in the Private Sector", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.50-57, 2019.
Manpower Levels for Business with Various Recruitment Rates in the Ten Point State Space System through Stochastic Models
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.58-61, Jan-2019
Abstract
Aim of the present study is to find the steady rate of crisis and steady state of probabilities with different situations which may be manpower, in irregular situations of complete availability, moderate availability and zero availability inside the case of manpower, business and recruitment. The various states have been discussed under the different assumptions that the transition from one state to another both business and manpower arise in exponential time with different parameters.
Key-Words / Index Term
Steady state, Crisis rate, Markov chain
References
[1]. D.J. Barthlomew, Statistical technique for manpower planning, John Wiley, Chichester(1979).
[2]. Chandraswkar, Natrajan, Two unit stand by system with confidence limits under steady state (1997).
[3]. R.C. Grinold, K.T. Marshall, Manpower planning models, North Holl,New York (1977).
[4]. G.W. Lesson, Wastage and promotion in desired manpower structures, J. Opl. Res. Soc., 33 (1982), 433–442.
[5]. McClean, Semi Markovian models in continuous time, J. Appl. Prob., 16 (1980), 416–422.
[6]. C. Mohan, R. Ramanarayanan, An analysis of manpower, Money and Business with Random Environments, International Journal of AppliedMathematics, Vol. 23, No. 5 (2010), 927–940.
[7]. C. Mohan,P.Selvaraju, Stochastic Analysis of a Business with Varying Levels in Manpower and Business, International Journal of Applied Engineering Research, ISSN 0973-4562 Vol. 10 No.53 (2015).
[8]. R. Ramanarayanan, K. Usha, n unit warm stand by system with Erlang failure and general repairand its dual, IEEE Trans. on Reliability, R-28, No. 2 (1979), 173–174.
[9]. K. Setlhare, Modeling of an intermittently busy manpower system, In:Proceedings at the Conference held in Sept, 2006 at Gabarone, Botswana (2007).
[10]. V. Subramanian, Optimum promotion rate in a manpower models. International Journal of Management and Systems,
Vol. 12, No. 2 (1996), 179–184.
[11]. Vajda, The stratified semi stationary population, Bio-Metrika, 34 (1947), 243–254.
[12]. P.C.G. Vassiliou, A higher order markovian model for prediction of wastage in manpower system, Operat. Res. Quart., 27 (1976).
Citation
R. Arumugam, M. Rajathi, "Manpower Levels for Business with Various Recruitment Rates in the Ten Point State Space System through Stochastic Models", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.58-61, 2019.
Energy Harvesting Multi-Relay Multi-Hop Models For Sustainable Wireless Sensor Network
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.62-68, Jan-2019
Abstract
The load inequality of sensor node is a relentless issue for Wireless Sensor Networks (WSNs). In this paper, we firstly propose a Multi-hop Multi-relay Network Model (MMNM) with Relaying Head (RH) to balance the load among sensor nodes. The evolution of recent energy harvesting delivers us the Energy accumulation Wireless Sensor Networks (EH-WSNs). Due to the indeterminacy of energy that can be harvested in ambient environment, study on energy management mechanism to achieve energy neutral is significant. We proposed a novel Sensor Nodes Pair (SNP) policy separate all the sensor nodes into two groups GSN and GSN’. With the function rotation of GSN and GSN’, we achieve continuous data transmission avoiding time delay. Also a Historical Harvested Energy Assigning Mechanism (H-HEAM) is proposed to ensure the energy neutral constrains and perpetual network operation. Extensive simulation results verify that our MMNM and H-HEAM are indeed able to improve the network overall performance on throughput, energy utilization efficiency and time delay.
Key-Words / Index Term
Energy Neutral, Energy Mechanism Management, Wireless Sensor Networks (WSNs), Energy Harvesting
References
[1] V. Tran-Quang, P. Nguyen Huu, and T. Miyoshi, “A transmission range optimization algorithm to avoid energy holes in wireless sensor networks,” IEICE Trans. Commun., vol. E94–B, no. 11, pp. 3026– 3036, 2011.
[2] J. Lian, K. Naik, and G. B. Agnew, “Data Capacity Improvement of Wireless Sensor Networks Using Non-Uniform Sensor Distribution,” Int. J. Distrib. Sens. Networks, vol. 2, no. 2, pp. 121–145, Mar. 2006.
[3] L. Xie, Y. Shi, Y. T. Hou, and H. D. Sherali, “Making Sensor Networks Immortal: An Energy- Renewal Approach With Wireless Power Transfer,” IEEE/ACM Trans. Netw., vol. 20, no. 6, pp. 1748– 1761, Dec. 2012.
[4] A. Kurs, A. Karalis, R. Moffatt, J. D. Joannopoulos, P. Fisher, and M. Soljacic, “Wireless power transfer via strongly coupled magnetic resonances.,” Science, vol. 317, no. 5834, pp. 83–6, Jul. 2007.
[5] M. Y. Naderi, K. R. Chowdhury, and S. Basagni, “Wireless sensor networks with RF energy harvesting: Energy models and analysis,” in 2015 IEEE Wireless Communications and Networking Conference (WCNC), 2015, pp. 1494–1499.
[6] M. Erol-Kantarci and H. T. Mouftah, “Missionaware placement of RF-based power transmitters in wireless sensor networks,” in 2012 IEEE Symposium on Computers and Communications (ISCC), 2012, pp. 000012–000017.
[7] P. Nintanavongsa, M. Y. Naderi, and K. R. Chowdhury, “Medium access control protocol design for sensors powered by wireless energytransfer,” in 2013 Proceedings IEEE INFOCOM, 2013, pp. 150–154.
[8] M. Y. Naderi, P. Nintanavongsa, and K. R. Chowdhury, “RF-MAC: A Medium Access Control Protocol for Re-Chargeable Sensor Networks Powered by Wireless Energy Harvesting,” IEEE Trans. Wirel. Commun., vol. 13, no. 7, pp. 3926– 3937, Jul. 2014.
[9] V. Sharma, U. Mukherji, V. Joseph, S. Gupta, Optimal energy management policies for energy harvesting sensor nodes, IEEE Transactions on Wireless Communications Vol.9, 1326–1336, 2010.
[10] J. Zhang, Z. Li, and S. Tang, Value of Information Aware Opportunistic Duty Cycling in Solar Harvesting Sensor Networks, IEEE Trans. Indus. Inform, Vol.12, No.1, 348-360, 2016.
[11] A. Kansal, J. Hsu, S. Zahedi, and M. B. Srivastava, Power management in energy harvesting sensor networks, ACM Transactions on Embeded Computer Systems, vol.6, No.32, 2007.
[12] S. Peng and C. P. Low, Throughput Optimal Energy Neutral Management for Energy Harvesting Wireless Sensor Networks, 2012 IEEE Wire. Commu.Netw.Conf, April 1-4. 2012.
[13] S. Peng, C.P. Low, Prediction free energy neutral power management for energy harvesting wireless sensor nodes, Ad Hoc Netw, Vol.13, Part. B, 351-367, 2014
Citation
Arya K S, P K Manojkumar, "Energy Harvesting Multi-Relay Multi-Hop Models For Sustainable Wireless Sensor Network", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.62-68, 2019.
Discusses the Data Procedures in the Marketing Research and its Contribution for Decision Making
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.69-74, Jan-2019
Abstract
Data age, stock up on limit, formulating power and systematic limit increment had made an advanced marvel named huge data that could make huge effect in innovative work. In the advertising field, the utilization of huge data in study can speak to a profound make a plunge buyerconsiderate. This article talks about the huge data exploits in the marketing info system and its commitment for basic leadership. It introduces a modification of primary ideas, the new potential outcomes of utilization and a reflection about its restrictions.
Key-Words / Index Term
Marketing Field, Stockpiling, Marketing Information System
References
[1] Acquisti, A., Gross, R. and Stutzman. “Faces of Facebook: Privacy in the Age ofAugmented Reality. Presented at BlackHat Conference Las Vegas”, August 4, 2011.
[2] Bush, V., Venable, B. and Bush, A., “Ethics and Marketing on the Internet:Practitioners’ Perceptions of Societal, Industry and Company Concerns”, Journal of Business Ethics 23, pp. 237–248.
[3] Boyd, D., “Privacy and Publicity in the Context of Big Data”, Presented conference Raleigh, North Carolina, April 29 2010.
[4] Cooke, M and Buckley, N Web 2.0, “social networks and the future of marketresearch”, International Journal of Market Research 50(2), 267-292, 2008.
[5] Christiansen, L., “Personal privacy and Internet marketing: An impossible conflictor a marriage made in heaven”, Business Horizons, November-December, pp. 509-514., 2008.
[6] Curtin, R., Presser, S. & Singer, E.,“Changes in Telephone Survey Nonresponse” over the Past Quarter Century. Public Opinion Quarterly, 69, pp.87-98.
[7] P.Economist. “Crunching the numbers; Big data. The Economist.2002.
[8] ESOMAR. “ICC/ESOMAR International Code on Market & Social Research”., 2002
Citation
S. Beschi, "Discusses the Data Procedures in the Marketing Research and its Contribution for Decision Making", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.69-74, 2019.
HR Management Using Big Data Analytics
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.75-79, Jan-2019
Abstract
In any organization’s talent management is becoming an increasingly crucial method of approaching HR functions. Talent management can be defined as an outcome to ensure the right person is in the right job. Human talent prediction is the objective of this study. Due to that reason, classification and prediction in data mining which is commonly used in many areas can also be implemented in this study. There are various classification techniques in data mining such as Decision tree, Neural networks, Genetic algorithms, Support vector machines, Rough set theory, Fuzzy set approach. This research has been made by applying decision tree classification algorithms to the employee’s performance prediction. Decision tree is among the popular classification technique which generates a tree and a set of rules, representing the model of different classes, from a given data set. Some of the decision tree algorithms are ID3, C5.0, Bagging, Random Forest, Rotation forest, CART and CHAID. In this paper give the overview of C4.5 algorithms.
Key-Words / Index Term
HR Analytics, Talent, Prediction, Decision Tree, Algorithm, C4.5, Classification, Data Mining, Big Data
References
[1]. More about “Big Data” Online Available From: http://en.wikipedia.org/wiki/Big_data
[2].https://www.youtube.com/watch?v=Pq3OyQOl3E Hilbert & López 2011
[3]. Bright Planet’s Blog(2012), “Structured vs. Unstructured Data”, Online Available from: https://www.brightplanet.com/2012/06/structure d-vs-unstructured-data/
[4]. A Quick Guide to Structured and Unstructured Data(2014) Online Available from: http://smartdatacollective.com/michelenemschoff /206391/quick-guide-structured-andunstructured- data
[5]. R. Thoran(2012), “10 emerging technologies for Big Data” Online Available from: http://www.techrepublic.com/blog/big-dataanalytics/ 10-emerging-technologies-for-big-data/
[6]. MapReduce Online Available from: http://en.wikipedia.org/wiki/MapReduce
[7]. IBM’s report on What is MapReduce Online Available from: http://www- 01.ibm.com/software /data/infosphere/hadoop/mapreduce/ SAS Report on Hadoop Online Available from: http://www.sas.com/en_us/insights/bigdata/ hadoop.html
[8]. Ranjan, J., "Data Mining Techniques for better decisions in Human Resource Management Systems". International Journal of Business Information Systems, 2008. 3(5): p. 464-481.
[9]. DeNisi, A.S. and R.W. Griffin, "Human Resource Management". 2005, New York: Houghton Mifflin Company.
[10]. A TP Track Research Report Talent Management: "A State of the Art". 2005, Tower Perrin HR Services.
[11]. Tso, G.K.F. and K.K.W. Yau, "Predicting electricity energy comsumption : A comparison of regression analysis, decision tree and nerural networks". Energy, 2007. 32: p. 1761 - 1768.
[12]. Han, J. and M. Kamber, "Data Mining : Concepts and Techniques". 2006, San Francisco: Morgan Kaufmann Publisher.
[13]. J. Ranjan, "Data Mining Techniques for better decisions in Human Resource Management Systems,"International Journal of Business Information Systems, vol. 3, pp. 464-481, 2008.
[14]. C. F. Chien and L. F. Chen, "Data mining to improve personnel selection and enhance human capital: A case study in high-technology industry,"Expert Systems and Applications, vol. 34, pp. 380-290, 2008.
[15]. A TP Track Research Report "Talent Management: A State of the Art," Tower Perrin HR Services 2005.
[16]. G. K. F. Tso and K. K. W. Yau, "Predicting electricity energy consumption: A comparison of regression analysis, decision tree and neural networks,"Energy, vol. 32, pp. 1761-1768, 2007.
[17]. I. Becerra-Fernandez, S. H. Zanakis, and S. Walczak, "Knowledge discovery techniques for predicting country investment risk,"Computers & Industrial Engineering, vol. 43, pp. 787-800, 2002.
[18]. P. R. Kumar and V. Ravi, "Bankruptcy prediction in banks and firms via statistical and intelligent techniques : A review,"European Journal of Operational Research, vol. 180, pp. 1-28, 2007.
Citation
S. Chitra, P. Srivaramangai, "HR Management Using Big Data Analytics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.75-79, 2019.
Analysis of Functionality and Major Issues in Data mining
Survey Paper | Journal Paper
Vol.07 , Issue.02 , pp.80-85, Jan-2019
Abstract
Database mining can be characterized as the way toward mining for understood, once unidentified, and possibly basic data from horrendously enormous databases by proficient information disclosure strategies. The protection and security of client data have turned out to be critical open strategy tensions and these nerves are getting expanded enthusiasm by the both open and government administrator and controller, security advocates, and the media. In this paper we centers around key online protection and security issues and concerns, the job of self-control and the client on security and security insurances, data assurance laws, administrative patterns, and the standpoint for protection and security enactment. Normally such a procedure may open up new presumption measurements, recognize new attack examples, and raises new data security issues. Ongoing improvements in data innovation have empowered accumulation and preparing of tremendous measure of individual data, for example, criminal records, online shopping habits, online banking, credit and medical history, and driving records and essentially the administration concerned data.
Key-Words / Index Term
Data mining, Security, Privacy
References
[1]. D. R. Stinson, “Cryptography: Theory and Practice 3rd Edition,”Text Book, 2006.
[2]. C.-H. Yeh, G. Lee, and C.-Y. Lin, “Robust Laser Speckle Authentication System through Data Mining Techniques,” IEEE Transactions on Industrial Informatics, vol. 11, no. 2, pp. 505–512, 2015.
[3]. S. Khan, A. Sharma, A. S. Zamani, and A. Akhtar, “Data Mining for Security Purpose & its Solitude Suggestions,” International Journal of Technology Enhancements and Emerging Engineering Research, vol. 1, no. 7, pp. 1–4, 2012.
[4]. Venugopal K R, K G Srinivasa and L M Patnaik,“Soft Computing for Data Mining Applications,” Springer, 2009.
[5]. Vasanthakumar G U, BagulPrajakta , P Deepa Shenoy, Venugopal K R and L M Patnaik,“PIB: Profiling Influential Blogger in Online Social Networks, A Knowledge Driven Data Mining Approach,”11th International Multi-Conference on Information Processing (IMCIP), vol. 54, pp. 362– 370, 2015.
[6]. H. Zang and J. Bolot, “Anonymization of Location Data Does Not Work: A Large-Scale Measurement Study,” In Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, pp. 145–156, 2011.
[7]. R. J. Bayardo and R. Agrawal, “Data Privacy Through Optimal k-Anonymization,” 21st International Conference on Data Engineering (ICDE’05), pp. 217–228, 2005.
[8]. A. Friedman, R. Wolff, and A. Schuster, “Providing kAnonymity in Data Mining,” The VLDB Journal, vol. 17, no. 4, pp. 789–804, 2008.
[9]. R. Lu, X. Liang, X. Li, X. Lin, and X. Shen, “EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications,” IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 9, pp. 1621–1631, 2012.
[10]. C. Dwork, F. McSherry, K. Nissim, and A. Smith, “Calibrating Noise to Sensitivity in Private Data Analysis,” Theory of Cryptography Conference, pp. 265–284, 2006.
[11]. M. Siddiqui, M. C. Wang, and J. Lee, “Detecting Internet Worms Using Data Mining Techniques,” Journal of Systemics, Cybernetics and Informatics, vol. 6, no. 6, pp. 48–53, 2009.
[12]. Wu, V. Kumar, J. R. Quinlan, J. Ghosh, Q. Yang, H. Motoda, G. J. McLachlan, A. Ng, B. Liu, S. Y. Philip et al., “Top 10 Algorithms in Data Mining,” Knowle - dge and Information Systems, vol. 14, no. 1, pp. 1– 37, 2008.
[13]. M. S. Abadeh, J. Habibi, and C. Lucas, “Intrusion Detection using a Fuzzy Genetics-Based Learning Algorithm,” Journal of Network and Computer Applications, vol. 30, no. 1, pp. 414–428, 2007.
[14]. K. S. Desale and R. Ade, “Genetic Algorithm Based Feature Selection Approach for Effective Intrusion Detection System,” International Conference on Computer Communication and Informatics (ICCCI), pp. 1–6, 2015.
Citation
J. Jones Mary, P. Srivaramangai, "Analysis of Functionality and Major Issues in Data mining", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.80-85, 2019.
Fingerprint Minutiae Identification Using RLC Method
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.86-89, Jan-2019
Abstract
This paper is aimed to design a scheme to mark and extract minutiae of fingerprint using Run-length Coding technique. Minutiae extraction takes vital role in fingerprint based authentication and identifications systems. The scheme comprises of binarization, thinning, minutia marking and extraction. The scheme is tested using the FVC database and real time fingerprint datasets. The Experimental results are presented.
Key-Words / Index Term
fingerprint, minutiae, filter, preprocessing, binarization, thinning, Gabor
References
[1] Anil K. Jain, Yi Chen, and MeltemDemirkus, “Pores and Ridges: High-Resolution Fingerprint Matching Using Level 3 Features”, IEEE Transactions on Pattern Analysis and Machine Intelligence, Vol. 29, No. 1, January 2007.
[2] Hans Van Den Nieuwendijk, “Fingerprints”, eBook.
[3] Haralick, Robert M., and Linda G. Shapiro, Computer and Robot Vision, Volume I, Addison-Wesley, pp. 28-48, 1992.
[4] V.Rajaraman, Introduction to Information Technology, Third Edition.
[5] Nalini K. Ratha, Shaoyun Chen, Anil K. Jain , Adaptive flow orientation based feature extraction in fingerprint images, Pattern Recognition, Vol. 28, issue 11, 1995.
[6] Chih-Jen Lee and Sheng- De Wang,A Gabor filter-based approach to fingerprint recognition, DOI, 0-7803-5650-0/99, IEEE, 1999.
[7] Anil K. Jain, Prabhakar S, Hong L, A Multichannel approach to fingerprint classification, IEEE Transactions on Patt. Anal. Mach. Intel. , 21(4):348-359, 1999.
[8] Wan S, Fingerprint Classifications by directional fields, Fourth IEEE Int. Conference on Multimodal Interfaces (ICMI ’02), 2002.
[9] Neil Yager and Adnan Amin, Fingerprint Classification: a review, Pattern Analysis and Applications, Springer, Vol. 7, number 1, 77-93,2004.
[10] SharatChikkerur, Chaochang Wu, and VenuGovindaraju, A Systematic Approach for Feature Extraction in Fingerprint Images, Biometric Authentication, LNCS, Vol. 3072, 1-23,2004.
[11] Feng Zhoa and Xiaoou Tang, Preprocessing and Post processing for skeleton-based fingerprint minutiae extraction, Pattern Recognition, Vol. 40, 1270-1281, Elsevier, 2007.
[12] UdayRajanna, Ali Erol and George Bebis, A Comparative study on Feature Extraction for fingerprint classification and performance improvement using rank-level fusion, Pattern Analysis and Applications, Springer, 2009.
[13] Anil K. Jain, and Jianjiang Feng, Latent fingerprint Matching, IEEE Transactions on Pattern analysis and Machine Intelligence, vol. 23, No. 1, 2011.
[14] MATLAB 7.10, Help desk
[15] Lifeng He, Yuyanchao, Kenji Suzuki, Kesheng Wu, Fast Connected-component labeling, Pattern Recognition, Vol. 42, Issue 9, pp 1977-1987,2009.
Citation
K. Kanagalakshmi, "Fingerprint Minutiae Identification Using RLC Method", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.86-89, 2019.
A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network
Research Paper | Journal Paper
Vol.07 , Issue.02 , pp.90-94, Jan-2019
Abstract
The spread of data networks in networks and associations have prompted an every day immense volume of data trade between various networks which, obviously, has brought about new threats to the national associations. It very well may be said that data security has turned out to be today a standout amongst the most difficult zones. At the end of the day, deformities and impediments of computer network security address unsalvageable harm for undertakings. Along these lines, ID of security threats and methods for managing them is fundamental. Yet, the inquiry brought up in such manner is that what are the systems and approaches to manage security threats that must be taken to guarantee the security of computer networks? In this unique situation, the present investigation plans to complete an audit of the writing by utilizing prior looks into and library approach, to give security solutions despite threats to their computer networks. The aftereffects of this examination can prompt additionally comprehension of security threats and approaches to manage them and help to execute a safe data stage.
Key-Words / Index Term
Network Security, Threats, Privacy
References
[1] U. A. Sandhu, S. Haider, S. Naseer and O. U. Ateeb, A Survey of Intrusion Detection & Prevention Techniques, International Conference on Information Communication and Management IPCSIT: IACSIT Press, Singapore 2011.
[2] K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), Recommendations of the National Institute of Standards and Technology: NIST Special Publication, 2007.
[3] B. Menezes, Network Security and Cryptography (Patparganj, New Delhi: Cengage Learning India Pvt. Ltd, 2010).
[4] J. R. Vacca, Computer and information security handbook (New York: Morgan Kaufmann, Elsevier 2009) 39-66, 133-166, 255- 267, 293-306, 349-393, 469-496.
[5] A. Fuchsberger, Intrusion Detection Systems and Intrusion Prevention Systems, Published by Elsevier: Information Security Technical Report 10, 2005, 134-139.
[6] P. Innella, http://www.symantec.com /connect/articles/ managing-intrusion-detection-systems-large-organizationspart-one.
[7] EC-Council, Ethical Hacking and Countermeasures Version 6 Module XVII Web Application Vulnerabilities: International Council of E-commerce Consultants, 2008.
[8] R. E. Overill, ISMS insider intrusion prevention and detection, Published in Elsevier, Information security technical report 13, 2008, 216-219.
[9] N. Godbole, Information Systems Security: Security Management, Metrics, Frameworks and Best Practices (New Delhi: WIELY INDIA, 2009).
[10] N. F. Mir, Computer and Communication Networks (New York: Prentice Hall, 2006), 57-60, 101-125.
[11] B. Forouzan, Data Communications and Networking (New York: McGraw Hill, 2006), 3-23, 395-464.
[12] A. S. Ashoor and S. Gore, Importance of Intrusion Detection system (IDS), International Journal of Scientific and Engineering Research, 2(1), 2011, 1-4.
Citation
G. Kavitha, "A Fundamental Analysis of Intrusion Detection and Intrusion Prevention System in Network", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.90-94, 2019.
A Review on Cancelable Biometrics
Review Paper | Journal Paper
Vol.07 , Issue.02 , pp.95-97, Jan-2019
Abstract
The Cancelable biometrics is a recent development in biometrics based authentication and identification system. In order to avoid the theft of biometric patterns and to improve the security, it is necessary to adopt non- invertible and cancellable biometric templates. There are some methods with Cancelable and irrevocable nature. This paper is aimed to review the literature on the cancelable biometrics template generation methods. Iris biometric has been considered particularly for the further progress based on the methods of from review.
Key-Words / Index Term
Biometrics, Cancelable biometric templates. Image Embedding technique, Non-invertible Transformation Technique
References
[1] Vishal M. Patel, Nalini K. Ratha, et al., ”Cancelable Biometrics: A Review”. IIEEE Signal Processing Magazine, VOL. X, NO. X, MONTH 20XX
[2] Sanjay Kanade, Dijana Petrovska et al., “Cancelable Iris Biometrics and Using Error Correcting Codes to Reduce Variability in Biometric Data”. IEEE, 978-1-4244-3991-2009.
[3] Emanuela Piciucco, Emanuele Maiorana, et al.,”Cancelable Biometrics for Finger Vein Recognition”Section of Applied Electronics, Department of Engineering, Roma, Italy 978-1-4244-2175-6/08,2008IEEE.
[4] Nalini K. Ratha, and Jonathan H. Connell ,”Cancelable Iris Biometric”. IBM Watson Research Center, 978-1-4244-2175-6/08/$25.00 ©2008 IEEE
[5] Dr.E.Chandra and Ms.K.Kanagalakshmi ,”Cancelable Biometric Template Generation and Protection Schemes: a Review”. IEEE Dept. Of Computer Science,DJ Academy Managerial for Excellence, 978-1-4244-8679-3/11/$26.00 ©2011 .
[6] Rathgeb, F. Breitinger and C. Busch. J. K. Pillai, et al.,“ Alignment-Free Cancelable Iris Biometric Templates based on Adaptive Bloom Filters”.. In Proc. IEEE Int’l Conf. on Acoustics Speech and Signal Processing, pages 1838–1841. IEEE, 2010.
[7] Bismita Choudhury, Patrick et al.,”Cancelable Iris Biometrics Based on Data Hiding Schemes”. 2016 IEEE Student Conference on Research and Development (SCOReD) 9781-5090-2948-8/16, IEEE .
[8] Kenta Takahashi.”Cancelable Biometrics With Provable Security And Its Application To Finger Print Verification”.IEICETrans.Fundamentalsvol.24A,NO 1,Janaurary 2011.
[9] Nalini K. Ratha, ,Sharat Chikkerur et al.” Generating Cancelable Fingerprint Templates”.Transactions On Pattern Analysis And Machine Intelligence, VOL. 29, NO. 4, APRIL 2007
[10] Y. J. Chang, Z. Wende, and T. Chen, Biometrics-based cryptographic key generation," IEEE Interna-tionalConferenceon Multimedia and Expo, vol. 3,pp. 2203-2206, 2004
[11] L. Masek, “Recognition of Human Iris Patterns for Biometric.Identification”. The University of Western Australia, Perth, 2003.
[12] C. Vielhauer, R. Steinmetz, and A. Mayerhoefer, “Biometric Hash Based on Statistical Features of Online Signatures,” Proc. 16th Int’l Conf. Pattern Recognition, vol. 1, p. 10123, 2002.
[13] N. K. Ratha, J. H. Connel, and R. Bolle, “Enhancing security and privacy in biometrics-based authentication systems”, IBM Systems Journal, vol. 40, no. 3, pp. 614–634, 2001.
[14] Efficient Cancellable Biometric Key Generation Scheme for Cryptography Sunil V. K. Gaddam and Manohar Lal, International Journal of Network Security, Vol.11, No.2, PP.61-69, Sept. 2010
[15] C. Rathgeb and A. Uhl, “A survey on biometric cryptosystems and cancelable biometrics,” EURASIP Journal on Information Security, vol.2011, no. 1, pp. 1–25, 2011.
[16] B. Chen, and V. Chandran, “Biometric Based Cryptographic Key Generation from Faces," Proceedingsof the 9th Biennial Conference of the Australian Pattern Recognition Society on Digital Image ComputingTechniques and Applications, pp. 394-401, 2007.
[17] Teoh, A.B.J., Ngo, D.C.L.: “Cancellable Biometerics Featuring With Tokenised Random Number”.To appear in Pattern Recognition Letters (2004)
[18] P.Lacharme,A.Plateaux,“PIN-basedCancelable Biometrics”,International Journal of Automated Identification Technology, Vol. 3,Issue 2, pp. 75-79, 2011.
[19] M. Savvides, B.V.K. Vijaya Kumar, and P.K. Khosla, “Cancelable Biometric Filters for Face Recognition,” Proc. Int’l Conf. Pattern Recognition, pp. 922-925, 2004.
[20] Teoh, A.B.J., Ngo, D.C.L, Goh, A.: BioHashing: Two Factor Authentication Featuring Fingerprint Data And Tokenised Random Number. Pattern Recognition 37 (2004) 2245-2255.
[21] K. Kanagalakshmi and E.Chandra, Novel Shift-Phase Transformation based Cancelable and Irrevocable Biometric Template Generation for Fingerprints, International Journal of Computer Applications (0975 –8887),Volume 89 , No 20, pp: 41-53, March 2014.
[22] K. Kanagalakshmi and E.Chandra, “Novel Complex Conjugate-Phase Transform technique for cancelable and irrevocable biometric template generation for fingerprints”, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 4, No 2, pp: 426-436, July 2012.
[23] K.Kanagalakshmi and E.Chandra, A Novel Technique for Cancelable and Irrevocable Biometric Template Generation for Fingerprints”, Global Journal of Computer Science and Technology Graphics & Vision, Vol. 13, Issue 6, pp.1-11, 2013.
Citation
K. Kanagalakshmi, K. Lakshmi Priya, "A Review on Cancelable Biometrics", International Journal of Computer Sciences and Engineering, Vol.07, Issue.02, pp.95-97, 2019.