Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Gunasekaran, G.
- Preventing PC from Spam Zombies Using SPOT and RE-ENCRYPTION Methods
Abstract Views :144 |
PDF Views:3
Authors
Affiliations
1 Sathyabama University, Chennai, IN
2 Meenakshi College of Engineering, Chennai, IN
1 Sathyabama University, Chennai, IN
2 Meenakshi College of Engineering, Chennai, IN
Source
Software Engineering, Vol 6, No 8 (2014), Pagination: 232-235Abstract
Spamming is a most important threat which is easily spread across various machines over the network, so it is an easiest way to attackers to employ into larger number of machines without any restrictions. To detect the machines which are attacked by the spamming activities are called Spam Zombies. The Sequential Probability Ratio Test is used to detect false positive error rates and false negative error rates, which is based on the principle of SPOT. The protocol which is used to analyze the security of spam zombies followed by the proxy re-encryption mechanism called Onion Routing Protocol. By identifying the spam zombies the performance of the network admin can be increased by Heuristic Search mechanism.Keywords
Compromised Machines, Onion Routing Protocol, Spam Zombies, Proxy Re-Encryption, Heuristic Search Mechanism.- Preserving Data Privacy with Record Retrieval using Visual Cryptography and Encryption Techniques
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Faculty of Computer Science and Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Meenakshi College of Engineering, Chennai - 600078, Tamil Nadu, IN
1 Faculty of Computer Science and Engineering, Sathyabama University, Chennai - 600119, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Meenakshi College of Engineering, Chennai - 600078, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Secure data sharing using visual cryptography with selective retrieval upon key match is introduced in this paper. As an illustration, medical and student database is considered. Methods/Analysis: The original database is stored as relational database model. In shared data applications encryption is used to achieve privacy of sensitive (personal) data from unauthorized users. The work includes encryption, selective retrieval, retrieving records with matching markers, etc. The proposed system search records from queries in the encrypted domain itself. Findings: All application related operations like checking for some threshold value, searching for similar records across different users, etc. is included. Because of proposed system any leakage of information over retrieved set of documents is avoided. Existing searching algorithm requires O (n) comparisons (searching operations) at the server to evaluate if the database contains a chosen keyword. The communication overhead minimized between the user and server. The computation is minimized between server and user. It allows the multi-user to search over the encrypted data. Searching time is minimized by relational database management. From encrypted query server cannot, distinguish between documents, determine document contents, check for search keyword and extend beyond decrypted result. Novelty/Improvement: The algorithm is novel in the sense that uncorrelatedness among the different user's data is preserved, along with complete sharing.Keywords
Encryption, Data Privacy, Decryption, Record Retrieval, Visual Cryptography.- Fuzzy Logic based Nam Speech Recognition for Tamil Syllables
Abstract Views :157 |
PDF Views:0
Authors
V. Prabhu
1,
G. Gunasekaran
2
Affiliations
1 Department of Electronics and Communication Engineering, MAHER Deemed University, Chennai – 600 078, Tamil Nadu, IN
2 Meenakshi Engineering College, Chennai – 600078, Tamil Nadu, IN
1 Department of Electronics and Communication Engineering, MAHER Deemed University, Chennai – 600 078, Tamil Nadu, IN
2 Meenakshi Engineering College, Chennai – 600078, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 1 (2016), Pagination:Abstract
Background/Objectives: In this paper, we propose the speech recognition of tamil words from dump mute persons with NAM sensor. Methods/Statistical analysis: The NAM sensor collects the speech signal of the tamil words frequently used in day-to-day life. These frequently used words are classified using fuzzy logic, based on syllables and the words are recognized. Findings: Until now, the NAM speech recognition was implemented only for vowels. From the 50 sample of speech sound, we attained 85% of accuracy in recognition. Application/Improvements: System helps in recognizing the tamil words from dump mute persons.