Vol 5 Issue 1 January 2017-March 2017
NAULESH KUMAR
Abstract: Today, it is imperative for an enterprise/organization to protect critical data from both internal and external threats and ensure for security. As the incidence and severity of security breaches continues to grow, it is increasingly incumbent upon organizations to begin encrypting data inside the enterprise. Ingrian offers breakthrough solutions that make it practical to encrypt critical data, and ensure it’s secured throughout an organization.
The Thesis is focus on how organizations can implement Ingrian DataSecure Platforms and employ them to encrypt critical data inside a database. Here I have discuss how critical data is encrypted in data base step by step by creating a table CUSTOMER by using SQL Query. With Ingrian DataSecure Platforms, organizations can protect critical data from both internal and external threats, and ensure compliance with legislative and policy mandates for security. Secure key management, backup, and administration are a few of the core elements for achieving true data privacy. Because Ingrian Data Secure Platforms have been built from the ground up with security in mind, implementing these policies and procedures is fast and easy, utilizing our unique management interface. We encourage administrators to focus on developing key management and administrative policies for their organizations that will provide maximum security and hope that this thesis will serve as a guide in this effort.
The thesis specifies two cryptographic algorithms, the Data Encryption Standard (DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. The Data Encryption Standard is being made available for use by Federal agencies within the context of a total security program consisting of physical security procedures, good information management practices, and computer system/network access controls.
Keywords: Data encryption, Key management, Critical Data, Data Security, Algorithm, SQL Query.
Title: Encrypting Critical Data in Databases
Author: NAULESH KUMAR
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
J.Senthil Murugan, R.Dhanaprabhu, R.Jayabalaji, C.Shinia Hephizibha
Abstract: The plant disease identification by a visual way is the more laborious task and at the same time less accurate and can be done only in limited areas. Where if automated detected technique is utilized it will take fewer efforts, less time and more accurately. The lemon leaf disease is detected by using the threshold based image segmentation and analyze the features by using the gradient boost algorithm and apply the feature classification through SVM base. The identification of disease in lemon leaves like armillaria root rot, bacterial blast, citrus nematode and etc. The SVM gives the better result for incrementing the precision of detection.
Keywords: MIAS, SVM, Threshold, HOG.
Title: Lemon Tree Disease Detection by Analyzing Lemon Leaf
Author: J.Senthil Murugan, R.Dhanaprabhu, R.Jayabalaji, C.Shinia Hephizibha
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Nadeem Tariq Beigh, Mir Mohammad Burhan, Faizan Tariq Beigh
Abstract: In this paper we present a fuzzy logic hardware implementation of a 2:1 multiplexer using MOSFETs. We propose the design of fuzzy multiplexer using more sophisticated CMOS technology with a low power design. The fuzzy multiplexer acts as a switch to determine the relation of a fuzzy input ‘s’ with the two fuzzy sets ‘input1’ and ‘input2’ to obtain an output fuzzy set ‘output’. The fuzzy multiplexer forms the main building modules in fuzzy systems. All designs and simulations were done using NI Multisim 13.0.
Keywords: Fuzzy logic, Fuzzy Gates, Fuzzy Multiplexer, Fuzzification, Membership Functions, Fuzzy Sets.
Title: MOS Based Fuzzy Logic Multiplexer Design and Simulation
Author: Nadeem Tariq Beigh, Mir Mohammad Burhan, Faizan Tariq Beigh
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
PATRICK OLOMOSHOLA
Abstract: The principal responsibility of the assessor is to locate, inventory, and appraise all property within the jurisdiction. A complete set of maps is necessary to perform this function. Maps help determine the location of property, indicate the size and shape of each parcel, and reveal geographic relationships that affect property value. Maps and map data are important not only for assessors, but also for other governmental agencies, the public, and the land information community. Computerization of map and parcel data can enhance the capability to manage, analyze, summarize, display, and disseminate geographically referenced information.
Keywords: parcel, parcel identifier, assessor, identification number, digital cadaster, map layers.
Title: A Programme For Automatically Generating And Attaching Unique Parcel Identifier To Plots Of Land In Federal Low-Cost Housing Estate, Oyo, Oyo State, Nigeria
Author: PATRICK OLOMOSHOLA
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Pooja K. Araj, Prof. P. E. Ajmire
Abstract: Compound character recognition of Handwritten Devanagari is one of the challenging tasks due to its complexity as compare to many other scripts. Compound characters itself complex in structure. It is written with combination of two or more characters. The character may be formed with different sequence of combinations of basic characters, such as vowels and consonants. The recognition of compound characters makes this task more challenging to the researchers. The frequency of occurrence of compound characters in Marathi language is more as compared to other languages derived from devanagari script. The various researchers used different classification techniques such as Neural Network, Soft Computing, Seventh Central Moment, Multiclass SVM Classifier with orthogonal moment, wavelet transformation etc. This paper deals with the study of different classification techniques used for compound character recognition of handwritten Devanagari compound character.
Keywords: Devanagari, Compound Character.
Title: Handwritten Devanagari Compound Character Recognition: A Survey
Author: Pooja K. Araj, Prof. P. E. Ajmire
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Deepa V B, Usha Devi M B
Abstract: PIM-DM is a multicast routing protocol that uses the underlying unicast routing information base to flood multicast datagrams to all multicast routers. Prune messages are used to prevent future messages from propagating to routers without group membership information. There are several polynomial-time algorithms for the maximum flow problem. One inherent drawback of these augmenting path algorithms is the computationally expensive operation of sending flows along paths. These algorithms might repeatedly augment flows along common path segments. The pre flow-push algorithms that we described in this paper overcome this drawback; we can conceive of them as sending flows along several paths simultaneously in PIM-DM wireless multicast.
Keywords: Mulicast, Maximum Flow, Pre Flow, PIM-DM.
Title: Computation of Maximum Flow Using PreFlow Push Algorithm in PIM-DM Wireless Multicast
Author: Deepa V B, UshaDevi M B
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Chiranjeev Singh, Apratim Gupta
Abstract: The purpose of this paper is to propose an algorithm which is an improvement over the Huffman Algorithm. The proposed algorithm works in a similar manner as the Huffman algorithm, here also we use a trie to generate a “CODEWORD” for each unique symbol, depending upon the frequency of occurrence of that particular symbol. Each codeword assigned is unique, i.e. no codeword or a part of the codeword is the prefix of any other, thus preventing ambiguity. We can easily identify the initial codeword, translate it back to the original character, and repeat the decoding process on the remainder of the encoded file. In the improvement part, we use a marker whose codeword is unambiguous and unique, and this marker is used to encode the uppercase English characters using the respective lowercase or vice- versa.
Keywords: Huffman Algorithm, codeword, marker, binary encoding, decoding, Huffman trie.
Title: Huffman Algorithm Improvement
Author: Chiranjeev Singh, Apratim Gupta
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Maxwell Scale Uwadia Osagie, Amanda Iriagbonse Inyang, Kingsley O. Obahiagbon, Joy Amenze Osagie
Abstract: Examination and record unit (ERU) is one of the most sensitive units in Nigeria universities systems. Most data kept in the domain of the ERU are usually for decisions and onward review. Hence, the preservation of ERU data formed one of the focal point of institution sustainability. Over the years, these data have one way or the other lost it integrity and as a result resulting to lack of trust in its output due to the method used in safeguarding student’s data. Though, this section in tertiary institutions is yet to be given adequate considerations, we hope to use this medium to not only draw the Nigeria tertiary institutions to what become of the institution if this current existing method is not improved upon but to made know the method used by most advanced country tertiary institutions that have so far demonstrated strong base in its data preservation. However, non logical interfaces of systems synchronized have over the years characterized the operational functions of the Nigeria tertiary Examination and Records Unit (ERU). The quest for proper protection of data in the ERU and its accessibility led to the design of a Digitalized Responsive Logical Interface Application (DRLIA) with an embedded feature such as keeping ERU data safer and accessible at any given point. The system works in three modules [i] Password/Staff number Synchronization, [ii] Encryption (token) Synchronization and [iii] i and ii synchronizations. This method help prevent unauthorized users from gaining access to the stored data, it also has the capability of recording time the authorized user gained access to the system in case of system theft. It has the ability to render the data unreachable, thereby making it not useful.
Keywords: Responsive, Synchronization, Application, Data and Unit.
Title: Digitalized Responsive Logical Interface Application
Author: Maxwell Scale Uwadia Osagie, Amanda Iriagbonse Inyang, Kingsley O. Obahiagbon, Joy Amenze Osagie
International Journal of Computer Science and Information Technology Research
ISSN 2348-1196 (print), ISSN 2348-120X (online)
Research Publish Journals
Vol 5 Issue 1 January 2017-March 2017
Abdul Rahman Ahmad Dahlan, Nur Aina Azman, Siti Junaidah Jamaludeen, Nur Izzuana Roslan , Nur Amrina Rosyada Idrus Saaidy
A Conceptual Business Model of E-Fashion: Harnessing on Big Data and Analytics, Abdul Rahman Ahmad Dahlan, Nur Aina Azman, Siti Junaidah Jamaludeen, Nur Izzuana Roslan , Nur Amrina Rosyada Idrus Saaidy, International Journal of Computer Science and Information Technology Research, ISSN 2348-120X (online), ISSN 2348-1196 (print), Research Publish Journals