Paper Type | :: | Research Paper |
Title | :: | Windows Files And Folders Security Using Cryptography And Steganography |
Country | :: | India |
Authors | :: | AnushaJagannathachari || Archana Nair || Prof Dr.Bharati Wukkadada || Prof. Dr. D.G Jha |
Page No. | :: | 01-06 |
This papers main aim would be to put forth the implementation of cryptography and steganography to secure files and folders in windows platform. It is a windows desktop application. Here the users can lock their various folders in a different format such as recycle bin, help and support, etc. Once it is locked, for example as recycle bin, the original contents of the locked folder will be hidden and replaced with recycle bin's contents. The locking and unlocking will be done with the help of passwords, which will be encrypted and stored in the database. Similarly, this application would also help us to lock an individual text file. By implementing steganography, the text file, pdf, PowerPoint slide etc can be converted to image and stored safely. The algorithm used for converting the text file to image and encrypting-decrypting the password is AES Algorithm.
Keyword : Asp.net with C#, Cryptography, Files, Folders, MySQL database, AES Algorithm, Steganography, Windows Desktop Application, Windows Operating System.
[1]. Juan-hua, Zhu; Ang, Wu; Kai, Guo, " PC Lock Software Design Based On Removable Storage Device and Dynamic Password" ,
2nd International Conference on Computer Engineering and Technology Journal VOL. 3, year 2010.
[2]. Rajkumar Janakiraman, Sandeep Kumar, Sheng Zhang, Terence Sim, "Using Continuous Face Verification to Improve Desktop
Security", Seventh IEEE Workshop on Applications of Computer Vision, (WACV/MOTION‟05).
[3]. Brendan Dolan-Gavitt, (May,2008), "Forensic analysis of the Windows registry in memory", MITRE Corporation, 202 Burlington
Road, Bedford, MA, USA.
[4]. Umut Uludag, Sharath Pankanti, Anil K. Jain,"Fuzzy Vault for Fingerprints" ,2010.
[5]. Ferhaoui Chafia, Chitroub Salim, Benhammadi Farid , "A Biometric Crypto-system for Authentication",2010.
Paper Type | :: | Research Paper |
Title | :: | Robo-bees: Intelligent Farmers for the Next Gen Agricultural Technology |
Country | :: | India |
Authors | :: | Shirley Sequeira || Prof. Harshali Patil |
Page No. | :: | 07-12 |
India is an agriculture based country and its development lies in the advancement of agricultural techniques. This paper discusses the framework for next gen framing based on a combination of precision agriculture and robotic systems. The work focuses on making agriculture domain tech savvy using robo-bees leading to improvement in the yield. Robo-bees are advancement in the field of drones. These Robo-bees are being used to monitor and take necessary decision based on the input provided by the sensor based fields. Robobees are of two types; Queen Bee and the Worker bees. The queen bee plays an important role in the decision making process for next gen farming..............
Keywords: Agricultural technology, data analysis, decision making, robo-bees, sensor based system.
[1]. Percentage of land under agriculture in India, https://data.worldbank.org/indicator/AG.LND.AGRI.ZS
[2]. Total Area under principal crops, average yield under principal crops http://www.mospi.gov.in/statistical-year-book-india/2016/177
[3]. Total population of India 2022, https://www.statista.com/statistics/263766/total-population-of-india/
[4]. Yongxian Song, Juanli Ma, Xianjin Zhang, Yuan Feng, "Design of Wireless Sensor Network-Based Greenhouse Environment
monitoring and Automatic Control System", Journal Of Networks, Vol. 7, No. 5, May 2012.
[5]. N.Sakthipriya, "An Effective Method for Crop Monitoring Using Wireless Sensor Network", MiddleEast Journal of Scientific
Research 20(9):1127- 1132, 2014 ISSN 1990-9233.
Paper Type | :: | Research Paper |
Title | :: | Comparative Analysis of algorithms while encrypting data in Cloud |
Country | :: | India |
Authors | :: | Shivam Agarwal || Tanuja Bodas || Dr. Bharati Wukkadada |
Page No. | :: | 13-17 |
This paper talks about data security, when confidential information is revealed into an undesirable environment intentionally or unintentionally, it is known as a data breach. This paper concern regarding stored data, the way it is encrypted and the problems faced during decryption. This paper aims to increase the time complexity to decrypt data using the RSA algorithm over various other algorithms like DES, AES, and IDEA along with concepts of factorization.
Keywords: R.S.A. algorithm, D.E.S., A.E.S., I.D.E.A.
[1]. Dr. D.I. George Amalarethinam, H. M. Leena, Enhanced RSA Algorithm with varying Key Sizes for Data Security in Cloud
[2]. Ying-yu Cao, Chong Fu ,An Efficient Implementation of RSA Digital Signature Algorithm
[3]. PachipalaYellamma, ChallaNarasimham, VelagapudiSreenivas; Data Security in cloud using RSA
[4]. Pradeep Semwal, Mahesh Kumar Sharma, Comparative Study of Different Cryptographic Algorithms for Data Security in Cloud
Computing
[5]. Krishna KeerthiChennam, Lakshmi Muddana, RajaniKanth, Aluvali, Performance Analysis of various Encryption Algorithms for
usage in Multistage Encryption for Securing Data in Cloud.
[6]. Zalak Bhatt, Prof. Vinit Gupta, Advanced Security Technique for Format Preserving Encryption
Paper Type | :: | Research Paper |
Title | :: | Vehicle Identification using Support Vector Machines |
Country | :: | India |
Authors | :: | Srinivas Subramani || Advait Avadhoot Joshi || Sangeetha Rajesh |
Page No. | :: | 18-21 |
Nowadays, there is a tremendous advancement in areas of automation and computer vision. Object identification is an essential process in these technologies. It identifies any specific object from an image or video sequence and the action is taken accordingly. Machine learning algorithms are extensively used for object identification in various applications. The necessary features are extracted from the images and are trained using various classifiers. This paper proposes an object identification technique using Support Vector Machines (SVM). The proposed system is compared with Decision Tree (DT) and K-Nearest Neighbor (KNN) classification algorithms. The object identification system is assessed on identification accuracy, prevision and recall.
Keywords: Decision Tree, K-Nearest Neighbor, Support Vector Machines.
[1] Noorpreet Kaur Gill, Anand Sharma, Vehicle Detection from Satellite Images in Digital Image Processing, International Journal of
Computational Intelligence Research, 13(5), 2017.
[2] Luigi Di Stefano, Enrico Viarani, Vehicle Detection and Tracking Using the Block Matching Algorithm, Proc. of 3rd IMACS/IEEE,
pp. 4491—4496, 1999.
[3] Juan Wu, Bo Peng, Zhenxiang Huang, Jietao Xie, Research on Computer Vision-Based Object Detection and Classification, IFIP
International Federation for Information Processing 2013, pp. 183–188, 2013.
[4] R.Muralidharan, Dr.C.Chandrasekar, Object Recognition using SVM-KNN based on Geometric Moment Invariant, International
Journal of Computer Trends and Technology, July-Aug 2011.
[5] Khushboo Khurana, Reetu Awasthi, Techniques for Object Recognition in Images and Multi-Object Detection, International
Journal of Advanced Research in Computer Engineering & Technology, vol. 2(4), pp. 1383-1388, 2013.
Paper Type | :: | Research Paper |
Title | :: | Sentiment Analysis on Twitter Data for product evaluation |
Country | :: | India |
Authors | :: | Prof. SudarshanSirsat || Dr.Sujata Rao || Dr.Bharti Wukkadada |
Page No. | :: | 22-25 |
As more and more people are expressing their views and opinions on various microblogging websites there has been a surge of data generated by the users, these websites have people sharing their thoughts daily because of short and simple form of expressions. We can consider such type of data as a resource and perform sentiment analysis on data of various products and services making better data driven decisions. This paper highlights the usefulness of sentiment analysis along with the type of data that is being analyzed, the complex process involved in analyzing the data, the different approaches that can be used, and an experimental observation using the Machine Learning approach
Keywords : Microblogging, Twitter, Sentiment Analysis, API, NLTK, Naïve Bayes Classifier Machine Learning Approach, Lexicon based Approach.
[1]. Niu, Y., Zhu, X., Li, J., Hirst, G. 2005: Analysis of polarity information in medical text. In Proceedings of the American Medical
Informatics Association 2005 Annual Symposium
[2]. AlessiaD‟Andrea, Fernando Ferri, PatriziaGrifoni, TizianaGuzzo: Approaches, Tools and Applications for Sentiment Analysis
Implementation
[3]. Balahur, A., Kozareva, Z., Montoyo, A. 2009: Determining the polarity and source of opinions expressed in political debates.
[4]. Medhat, W., Hassan, A., Korashy, H. 2014. Sentiment analysis algorithms and applications: A survey, Ain Shams Eng.
[5]. Apoorv Agarwal BoyiXie Ilia Vovsha Owen Rambow Rebecca Passonneau : Sentiment Analysis of Twitter Data
[6]. S. Karthika* and N. Sairam :A Naïve Bayesian Classifier for Educational Qualification.
[7]. Jebaseeli, A. N., &Kirubakaran, E. 2012. A survey on sentiment analysis of (product) reviews. International Journal of Computer
Applications, 47(11).
[8]. Kaur, A., & Gupta, V. 2013. A survey on sentiment analysis and opinion mining techniques. Journal of Emerging Technologies in
Web Intelligence, 5(4), 367-371.
Paper Type | :: | Research Paper |
Title | :: | Analysis of Intrusion Detection Models for Wireless Sensor Networks |
Country | :: | India |
Authors | :: | Vaidehi.V. Bhatt |
Page No. | :: | 26-28 |
With increase in the utility of Wireless Sensor Networks in various mission critical fields like
environmental monitoring, traffic control, military, medical and healthcare, inventory tracking and smart
spaces; secure and reliable sensor networks are a necessity. Majority of sensor networks are deployed in hostile
areas making them difficult to maintain. With limited energy of sensor nodes deploying an efficient Intrusion
Detection System which does not consume more resources than the primary function of the network is of
paramount importance. The Intrusion Detection System should detect and recover from internal and external
attacks. In this paper, analysis of different methodologies is performed to identify their advantages and
disadvantages.
Keywords: - WSN, IDS, TPIDS, HIDS, EPID, Cognitive networks.
[1]. Han Zhijie, Wang Ruchuang, Intrusion Detection for Wireless Sensor Network Based on Traffic Prediction Model, International
Conference on Solid State Devices and Materials Science, 2012.
[2]. Joseph Rish Simenthy CEng , AMIE, K. Vijayan, Advanced Intrusion Detection System for Wireless Sensor Networks,
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering, 2014.
[3]. Khandakar Rashed Ahmed , A.S.M Shihavuddin, Kabir Ahmed, Md. Shirajum Munir and Md Anwar Asad, Abnormal Node
Detection in Wireless Sensor Network by Pair Based Approach using IDS Secure Routing Methodology, IJCSNS International
Journal of Computer Science and Network Security, VOL.8 No.12, December 2008.
[4]. G Sunilkumar , Thriveni J , K R Venugopal , L M Patnaik, Cognitive Approach Based User Node Activity Monitoring for Intrusion
Detection in Wireless Networks, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 3, March 2012.
[5]. Ana Paula R. da Silva, Marcelo H.T. Martins, Bruno P.S. Rocha, Antonio A.F. Loureiro, Linnyer B. Ruiz, Hao Chi Wong,
Decentralized Intrusion Detection in Wireless Sensor Networks, Proceedings of the First ACM Workshop on Q2S and Security for
Wireless and Mobile Networks, Montreal, Quebec, Canada, October 13, 2005.
© 2019 All Rights Reserved | Design by iosrjen