Refine your search
Collections
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Bulli Babu, R.
- Contemplation of Expunged Data with the help of Digital Forensic Toolkits
Abstract Views :150 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 30 (2016), Pagination:Abstract
Objective: The main motto of this work is to trace the cyber fraud people and moreover we had extended this work in multiple way usage in the forensic mode. Method: So in this method let us imagine a scenario in which something incorrectly happen on the server and on the off chance that if an association will misfortune some kind of information (means if an association will hack and misfortune some critical information. Yes this may happen, it may happen in light of the fact that an assailant more keen than an infiltration analyzer. So after this the time is to get the programmer, for this reason you require a scientific device, so in this article we will talk about DEFT Linux a complete distro for measurable purposes. Findings: The Digital Evidence and Forensic Toolkit or DEFT Linux, is a live distro that gives devices to investigating PC frameworks and gathering criminological confirmation. The distro contains apparatuses for scanning and breaking down circle drives, databases and system movement of Windows and Linux frameworks. Application: DEFT incorporates instruments to bolster Incident Response, Cyber Intelligence and Computer Forensics. It incorporates WINE and the Digital Advanced Response Toolkit (DART). The essential center of the distro is the precise and dependable gathering of proof for use in criminal procedures. Thus, most DEFT devices are arranged to gathering data without changing the framework being analyzed. And more over we had used FTK imager and Winhex, data recovery tools to find suspect. So, finally in this paper we are going to test an unapproved information with a planned results.Keywords
DART, DEFT, Computer Forensic, Cyber Intelligence, Penetration.- Detection of Crimes using Unsupervised Learning Techniques
Abstract Views :152 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, K. L. University, Guntur - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, K. L. University, Guntur - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 17 (2016), Pagination:Abstract
Objectives: The main objective of this paper is to solve the criminal problems with in less amount of time. There are many methods to do so but this paper concentrates in solve the easily and reduce the time in solving the case. Methods: To solve the criminal cases with in less time there are many methods but here we used clustering technique. Cluster analysis or clustering is the task of grouping a set of objects in such a way that objects in the same group (called a cluster) are more similar (in some sense or another) to each other than to those in other groups (clusters). When a case is enrolled into the data base before if there is any case similar to it then we can solve the case easily by doing the same procedure. Findings: Before they used to file a case on FIR. But now a day, they are using data bases to file a case. By getting any new case they are comparing the new case with the older case so that it will be easy to find the suspect as it takes less time to solve the case. Before they used for other techniques like classification etc. But in my findings and research work clustering is simple, more accurate and takes less time to solve the case easily. In clustering techniques also we have different type of algorithm, but in this paper we are using the k-means algorithm and expectation - maximization algorithm. We are using these techniques because these two techniques come under the partition algorithm. Partition algorithm is one of the best method to solve crimes and to find the similar data and group it. K-means algorithm is done by partitioning data into groups based on their means. K-means algorithm has an extension called expectation- maximization algorithm here we partition the data based on their parameters. Applications: This system can be used for the Indian crime departments for reducing the crime and solving the crimes with less time. This technique can be used to solve the crimes with in less time.Keywords
Clustering, Data Mining, Expectation– Maximization, K-Means, Unsupervised- Content based Image Retrieval using Color, Texture, Shape and Active Re-Ranking Method
Abstract Views :179 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, KL University, Guntur District - 522502, Andhra Pradesh, IN