Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage...
Digital Technology is inevitable for better life of the people. Voting by people plays the vital role in democracy as the leaders will be elected by it. IoT helps many edge devices to interact with a Cloud for storage and computation of the Voting results. The major concern for the Voter is whether the vote casted by him is tamperproof or not. Though Cloud offerings are started a decade ago still information security in the cloud is always a concern. This paper focuses on creating a tamperproof framework to ensure the data Integrity. It proposes a novel approach where the user can cast the vote from any of the electronic devices with a unique ID allotted to him, a two-step authentication can be applied like OTP to ensure the security. The votes from these edge devices will be sent to the untrusted third party public cloud for computation, the votes will be saved in the encrypted format. The computation will be done on encrypted data. The Block chain based workflow ensures that the votes which are shared in the encrypted format will not be tampered to ensure trust and Integrity to the proposed model. The model also can be extended to many public shared e-models like E-Auction and healthcare systems.
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the s...
In this paper we propose a novel algorithm for implementing the mathematical model using the Non Linear Time Series Forecasting using the methods of deep learning which has to avoid noise and tends to transforms the space to next level in a iterative manner by swapping the down-trend to up-trend or up-trend to down-trend based on the iterative set values by computing the transformations. The proposed model must handle huge dimensional data which is in a dynamic nature of proposed model and then we need to compare the results attained from the proposed model with the complex ARIMA model and identified various trial and error methods for predicting the future price without guidance. For obtaining the results we used the petroleum dataset of India and attained the results which prove that our proposed mathematical model is far better than the famous ARIMA model while handling non linear time series applications.
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. ...
This article has been withdrawn: please see Elsevier Policy on Article Withdrawal ( https://***/about/our-business/policies/article-withdrawal ). This article has been withdrawn at the request of the Editor in Chief. Subsequent to acceptance of this special issue paper by the responsible Guest Editor Vimal Shanmuganathan, the integrity and rigor of the peer-review process was investigated and confirmed to fall beneath the high standards expected by Microprocessors & Microsystems. There are also indications that much of the Special Issue includes unoriginal and heavily paraphrased content. Due to a configuration error in the editorial system, unfortunately the Editor in Chief did not receive these papers for approval as per the journal's standard workflow.
作者:
M. S. Bennet PrabaJ S Femilda JosephinAssistant Professor
Department of Computer Science and Engineering SRM Institute of Science and Technology Ramapuram Chennai India. Associate Professor
Department of Software Engineering SRM Institute of Science and Technology Kattankulathur Chennai – 603 203 India.
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intr...
Connected cars are comfortable to drivers. But it also threat to humans. Connected vehicles share data like street safety, traffic analysis, road administration information like café, hospital, etc utilizing intruded on web availability and it is time delicate. Connected vehicles allow drivers and passengers to connect to the outside world while on the road. Security is the primary challenge for automakers and other stakeholders, because connected vehicles rely on wireless and cellular communication interfaces. Information should be protected from intruders. The communications between connected vehicles should be a trusted one. Safety is the primary focus of connected cars and the intruders should be identified and the intruders and falsified nodes can be identified by authentication schemes. In VANET vehicles react as indicated by the data got from the opposite end, so it is very vital that the data spreading in the framework is valid and produced by a genuine client. But there are many pitfalls in various authentication schemes. Privacy of the connected vehicles should be while sharing information and also information shared between connected vehicles should be an authenticated one. So still it a major challenge in connected vehicles due to the special characteristics like mobility, time sensitive, etc. This survey discussed the various authentication schemes and the various attacks related to that. Based on the survey, future directions of the secured trusted communications of connected vehicles have been discussed. The aim of this survey is to identify secured authentication techniques for a trusted communication.
Recommender System suggests items of interest to users based on their preferences. These preferences are gauged through various sources such as purchase history, ratings, reviews and browsing behaviour. Collaborative ...
Recommender System suggests items of interest to users based on their preferences. These preferences are gauged through various sources such as purchase history, ratings, reviews and browsing behaviour. Collaborative filtering and content based filtering are the two widely used techniques that help in generating recommendations to the target user(s) by identifying similar users to target user or similar items to items of interest. Through this paper a new method to identify similar users based on the similarity of reviews has been proposed.
作者:
TS Sheela ShineyS Albert JeromeJemila RoseAssistant Professor
Department of Computer Science and Engineering St. Xavier's Catholic College of Engineering Chunkankadai Tamil Nadu India Associate Professor
Department of Biomedical Engineering Noorul Islam Centre for Higher Education Kumaracoil Tamil Nadu India Associate Professor
Department of Computer Science and Engineering St. Xavier's Catholic College of Engineering Chunkankadai Tamil Nadu India
Cervical cancer occurs in cervix region of women which is life threatening and is a key research in the field of medical diagnosis. Cervical cancer can be prevented if precancerous changes is diagnosed earlier and cur...
Cervical cancer occurs in cervix region of women which is life threatening and is a key research in the field of medical diagnosis. Cervical cancer can be prevented if precancerous changes is diagnosed earlier and cured properly. But finding cancer at the earlier stage is a tedious process. Cervical cancer screening is crucial since utmost of the screening procedures are invasive in nature. The objective is to automatically extract the area where in the cervical cancer starts to occur. In order to diagnose cervical cancer and distinguish the malignant and benign tissues, a cytology image obtained by cervicographic or colposcopy device is used. A robust segmentation algorithm is proposed that uses superpixel for the image segmentation method. This method is regularized by the combination of structural properties such as color, texture, and spatial data present in the superpixel graph.
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar meta...
In earlier days, welding only involves joining two metals of same kind and dissimilar metals were usually joined by fasteners. Friction Stud welding is a true engineering marvel of making welds between dissimilar metals without any melting or fillers involved. The friction stud welding doesn't involve heat generation from electricity and it is purely based on friction. Besides these facts the friction stud welding has numerous advantage and applications. This paper focuses on the process of stud welding, application and its limitations.
Ceramic/metal joints are possible with silid state joining techniques. Transient liquid phase bonding is a solid state joining process which is choice process. In this paper, numerical simulation of TLP bonding of cer...
Ceramic/metal joints are possible with silid state joining techniques. Transient liquid phase bonding is a solid state joining process which is choice process. In this paper, numerical simulation of TLP bonding of ceramic/metal is done by Finite Element simulation. The finite element analysis of the TLP process provides the temperature and residual stress distribution during the bonding. Aluminium sheet as interlayer having high wettability is used. Transient thermal analysis is performed and discussed.
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are pr...
Biometric systems are the most advanced access technology developed so far in the 21st century. It does not even require to carry key cards or passwords in mind. Today most of the commercial and private entries are protected by biometric recognition systems like fingerprint scans facial recognition, retina scans, voice matching, etc. Even our phones, laptops, and daily access devices are equipped with biometric systems. In banks, the PCs are secured by the combination of passwords and fingerprint scans. Biometric scans are considered the most secure access technology so far. Our paper is to examine whether they are secure? Should we rely on them with our hard-earned money and social identity? Is there any way we can use these services without actually compromising our data and security? Our observation is on our digital identity. Promoting digitization in every department brings our topic in the picture. All our information is saved in our phones, our daily routine, whom we talk, what we purchase, whom we chat, where we travel, etc. Almost every smartphone has biometric fingerprint locks which means our phones have our fingerprint scans in database and with internet blend it's tethered worldwide. Our fingerprints are connected to our bank accounts, PAN Cards, Passport, and SIM Cards using Aadhar Cards. If someone has our fingerprint they can easily reach our Aadhar Card and through that to all our personal information. Most of the phone companies are Chinese, Korean, German, and American. As per their country policies, they must share their data with the governing authorities. We aim to create a security system without actually using the biometric scans. The system is an advancement of the biometric system but with better accuracy and intelligence. We interface image acquisition tools to live track the red color things. The web camera or inbuilt system lens can be used as the acquisition system. When the red color object is moved in front of the lens it shows the co
作者:
Jagan Raj JayapandiyanC. KavithaK. SakthivelResearch Scholar
Department of Computer Science Periyar University Salem Tamil Nadu India Assistant Professor
Department of Computer Science Thiruvalluvar Goverment Arts College Tamil Nadu India Professor
Department of Computer Science and Engineering K. S. Rangasamy College of Technology Tamil Nadu India
In this research work, proposing an algorithm, which dynamically selects the best compression algorithms among several compression techniques for steganography encoding. Ranking and selection of best algorithm for eac...
In this research work, proposing an algorithm, which dynamically selects the best compression algorithms among several compression techniques for steganography encoding. Ranking and selection of best algorithm for each and every steganographic transaction is based on several factors like type of cover image being used for the transmission, length of the secret message, type of the message, compression ratio of the secret message being shared, encoding ratio of secret message over the medium etc., The proposed algorithm dynamically ranks and selects the right compression algorithm to be used for the given secret file to occupy lesser embedding space in stego-image.
暂无评论