bookmarks  

    No matching posts.
  • ⟨⟨
  • ⟩⟩

publications  20  

  •  

    , , and . International Journal of Innovative Research in Information Security, 09 (2): 45-49 (May 2023)1 Muhammad Kamran, Muhammad Asif, Zeeshan Ahmed, and H.B. Kekre. Ä Secure and Reliable Face Recognition Based Attendance System Using Block chain." In IEEE International Conference on Computer, Communication and Control Technology (I4CT), pp.1-5.IEEE,2021. 2 P.K.Shukla, S.K.Srivastava, and A.K.Tiwari."Deep Learning Based Face Recognition System for Attendance Management." In IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT), pp.466-470.IEEE,2021 https://doi.org/10.1109/rteict.2017.8256691 3 S.A. Hameed, Zeeshan Ahmed, and H.B. Kekre. "Privacy-Preserving Face Recognition for Attendance Systems." In IEEE International Conference on Computer, Communication and Control Technology (I4CT),pp.1-5.IEEE,2021. 4 Muhammad Asif, Zeeshan Ahmed, H.B. Kekre, and A.R. Naseer. Ä Survey of Face Recognition Techniques for Attendance System." In IEEE International Conference on Computer, Communication and Control Technology (I4CT),pp.1-5.IEEE,2020. 5 H.B.Kekre, S.R.Patil, and D.S. Dharaskar.Än Accurate and Efficient Face Recognition Based Attendance System." In IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI),pp.2265-2269.IEEE,2020. 6 E Varadharajan , R Dharani , S.Jeevitha, B Kavinmathi, S. Hemalatha “ Automatic Attendance Management system using face detection” at 2020 Department of InformationTechnology. https://doi.org/10.1109/get.2016.7916753 7 Shreyak Sawhney, Karan Kacker, Samayak Jain, Shailendra Narayan ,Rakesh Garg“Real Time Smart Attendance system using face recognition techniques “ in international conference on cloud computing data science and engineering 2019. https://doi.org/10.1109/confluence.2019.8776934.
    11 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 28-38 (May 2023)1 M. Fernando and J. Wijayanayaka, "Low cost approach for real time sign language recognition," 2013 IEEE 8th International Conference on Industrial and Information Systems, 2013, pp. 637-642, https://doi.org/10.1109/iciinfs.2013.6732059 2 M. Z. Islam, M. S. Hossain, R. ul Islam and K. Andersson, "Static Hand Gesture Recognition using Convolutional Neural Network with Data Augmentation," 2019 Joint 8th International Conference on Informatics, Electronics & Vision (ICIEV) and 2019 3rd International Conference on Imaging, Vision & Pattern Recognition (icIVPR), 2019, pp. 324-329, https://doi.org/10.1109/iciev.2019.8858563 3 E. Kaya and T. Kumbasar, "Hand Gesture Recognition Systems with the Wearable Myo Armband," 2018 6th International Conference on Control Engineering & Information Technology (CEIT), 2018, pp. 1-6, https://doi.org/10.1109/ceit.2018.8751927 4 Lesha Bhansali and Meera Narvekar. Gesture Recognition to Make Umpire Decisions. International Journal of Computer Applications 148(14):26-29, August 2016. https://doi.org/10.5120/ijca2016911312 5 Suvarna Nandyal and Suvarna Laxmikant Kattimani 2021 J. Phys.: Conf. Ser. 2070 012148 6 Y. Madhuri, G. Anitha. and M. Anburajan., "Vision- based sign language translation device," 2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013, pp. 565-568, https://doi.org/10.1109/icices.2013.6508395 7 Nusirwan Anwar bin Abdul Rahman, Kit Chong Wei and John See Faculty of Information Technology, Multimedia University. 8 Moin, A., Zhou, A., Rahimi, A. et al. A wearable biosensing system with in-sensor adaptive machine learning for hand gesture recognition. Nat Electron 4, 54–63 (2021). https://doi.org/10.1038/s41928-020-00510-8 9 Ravi, H. Venugopal, S. Paul and H. R. Tizhoosh, Ä Dataset and Preliminary Results for Umpire Pose Detection Using SVM Classification of Deep Features," 2018 IEEE SymposiumSeries on Computational Intelligence (SSCI), 2018, pp. 1396-1402, https://doi.org/10.1109/ssci.2018.8628877 10 M. A. Shahjalal, Z. Ahmad, R. Rayan and L. Alam, Än approach to automate the scorecard in cricket with computer vision and machine learning," 2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017, pp. 1-6, https://doi.org/10.1109/eict.2017.8275204.
    11 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 09 (2): 21-27 (May 2023)1. Currency Recognition system using Image Processing. SANDEEP KUMAR CHAUBEY Andrew S. Morgan Kaufmann Publishers, 1995. 2. A Survey on Indian Currency Note Denomination Recognition System. Aruna Manpreet Bagga, Dr.Baljit Singh. 1995. 3. Dr. Baljith Singh, Aruna D H Indian currency note denomination system. 4. Ms. Monali Patil, Prof. Jayant Adhikari Detection of fake currency using digital image processing. 5. Arun Anoop M, Dr K.E. Kannammal Fake currency detection 6. Vidhi Roy and Sushanth Patil Fake Currency detection using image processing. 7. M. Deborah and Soniya Prathap Detection of Fake currency using edge detection. 8. Akash Rana, Avinash Kumar and Shivam Kumar Jha Detection of fake currency using machine learning technique. 9. Mayadevi, A. Gaikwad, Vaijinath, V. Bhosle and Vaibhav Currency note feature extraction. 10. Brinda M Object Detection using Haar-Like Feature Extraction..
    11 months ago by @ijiris
    (0)
     
     
  •  

    , , , and . International Journal of Innovative Research in Information Security, 9 (2): 15-20 (May 2023)1 D. Pavithra; Ranjith Balakrishnan, “IOT based monitoring and control system for home automation”, IEEE Explore, Communication Technologies (GCCT). https://doi.org/10.1109/gcct.2015.7342646 2 Dr. M. Suresh, A. Amulya, M. Hari Chandana, P. Amani, T. Lakshmi Prakasam. “Anti theft flooring system using raspberry pi using” in Compliance Engineering journal, vol 12, no. 7, pp. 306 – 317, 2021. 3 Sonali Das, Dr. Neelanarayan, “ IOT Based Anti Theft Flooring System” in IJESC , vol 10, no.4, pp. 25463-25466,2020. 4 Siddalingesha G.R, H. M. Shamita, “IOT Based Anti Theft System for home” in IRJET, vol 8, no. 10, pp. 509 – 513, 2021. 5 Sanjana Kute, Ruthvik Pimpalkar, Shivajirao S, “Theft Detection System” in IRE Journals, vol 4, no 10, 2456 – 2462, 2021. 6 Gaurav Sable, Gaurav Sharma, Manish Bhalerao, Yash Ramugade, “IOT Based Theft Detection using Raspberry Pi” in IJIRT, vol 11, no 12, 2356 – 2360, 2022. 7 Mohd Musab, Ms. Seema Kaloria, Ankit Chhipa, Anand Sharma, Fardeen Mansoori, “IOT Based Anti-Theft Security System” in IJRTI, vol 7, no 6, pp. 106 – 109, 2022. 8 Santosh Mahale, Shivam Gujrathi, Pratik Bramhecha, Kalyani Bedarkar, Rohini Shinde, Yashraj Patil, “Anti-Theft Detection System” in IJIRSET, vol 9, no 4, pp. 1889 – 1895, 2020. 9 Sharnil Pandya, Hemant Ghayvat, Ketan Kotecha, Mohammed Awais, Saeed Akbarzadeh, Prosanta Gope , Subhas Chandra Mukhopadhyay and Wei Chen, “Smart Home Anti-Theft System” in applied system innovation, vol 1, no 42, pp. 1-22, 2018 https://doi.org/10.3390/asi1040042 10 Mr. Vikrant A. Agaskar, “ IOT BASED IOT Based Theft Detection” in IJCRT, vol 6, no 2, pp. 231 – 234, 2018..
    11 months ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, 10 (01): 01-06 (April 2023)1. A.Sairohan, Dr.K.V.Ranga Rao, V.Sridhar “Smart gloves for real time applications,” vol. 11, pp. (2021). 2. Girish Gajanan Mulye “Advance Glove for Blind,” IJSR, vol. pp (2020). 3. Somashekar V, Manohar R, Ashwini M S, Praveen V, Sushmitha M “Smart glove for blind using TensorFlow,” IRJET, vol. 7, pp. (2020) 4. Arsh.A.Ghate, Vishal.G.Chavan “Smart gloves for blind,” IRJET, vol. 4, pp. (2017). 5. Hiranya Peiris, Charitha Kulasekara, HashanWijesinghe, Basiru Kothalawala, Namalie Walgampaya, Dharshana Kasthurirathna “Eye Vista: An assistive wearable device for visually impaired sprint athletes,” IEEE vol* pp.,(2016).
    12 months ago by @ijiris
    (0)
     
     
  •  

    , , and . International Journal of Innovative Research in Information Security, VIII (II): 06-09 (July 2021)1. Door Unlock using Face Recognition (Abdul Azeem, Sathuluri Mallikarjun Rao,Kandula Rama Rao, Shaik Akbar Basha, Harsha Pedarla, Modela Gopi) 2. Facial Recognition Enabled Smart Door Using Microsoft Face API (Karan Maheshwari , Nalini N) 3 Automated door access control system using face recognition (Tejas Saraf, Ketan Shukla, Harish Balkhande, Ajinkya Deshmukh) 3. Facial recognition enabled smart door unlock system(M Vamsi Krishna, A Bhargav Reddy, V Sandeep) 4. Smart Door with Face UnlockApache2.0 (https://create.arduino.cc) (Divins Mathew) 5. Makers Pro Projects(Simple Door Lock Using Face recognition Solenoid Lock)(Muhammad Aqib).
    3 years ago by @ijiris
    (0)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue X): 99-103 (December 2020)1. Argyris, C., & Schon, D., (1978). Organizational Learning: A Theory of Action Perspective, Addison-Wesley, Reading, MA. 2. Argyris, C., Putman, R., and McLain Smith, D., (1985). Action Science, Concepts, Methods, and Skills for Research and Intervention, San Francisco, Jossey Bass 3. Bapuji, H., and Crossan, M. (2004). From Raising Questions to Providing Answers: Reviewing Organizational Learning Research, Management Learning, Vol. 35, No.4, PP. 397-417. 4. Bhattacherjee, A. (2012). Social Science Research: Principles, Methods, and Practices (2nd ed.). Textbooks Collection. Book 3. http://scholarcommons.usf.edu/oa_textbooks/3 5. C. Mausolff., (2004). Learning from feedback in performance measurement systems. Public Performance and Management Review, 28: 9-29 4. 6. C.M. Graham and F.M. Nafukho. (2007). Culture, organizational learning, and selected employee background variables in small size business enterprises. Journal of European Industrial Training, 31:127-144 6. 7. Chiva, R., Grandío, A., & Alegre, J., (2010). Adaptive and Generative Learning: Implications from Complexity Theories, International Journal of Management Reviews, Vol. 12, No. 2, PP. 114-129. 8. De Geus, A.p. (1988). Planning as learning Harvard Business Review,66(2),70-74. 9. Dimovski, V., (1994). Organizational Learning and Competitive Advantage, Ph.D. Thesis, Cleveland, Ohio 10. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm 11. Farago, J., and Skyrme, D., (1995). The Learning Organization, (On-line), Available at http://www.skyrme.com/insight/3lrnorg.htm. fifth edition (5th ed.). Edinburgh Gate, Harlow, Pearson Education Limited. 12. Finger, M., & Brand, S., (1999). The Concept of The Learning Organization, Applied To The Transformation of The Public Sector, In M. Easterby-Smith, L. Araujo and J. Burgoyne, Organizational Learning and The Learning Organization, London: Sage, P.2..
    3 years ago by @ijiris
    (0)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue VIII): 76-80 (August 2020)1. Seenivasagam V, Velumani R, “A QR code based zero-watermarking scheme for authentication of medical images in teleradiology cloud,” Computational and mathematical methods in medicine, 2013. 2. Parah S A , Sheikh J A , Ahad F , et al, “Information hiding in medical images: a robust medical image watermarking system for E-healthcare, “Multimedia Tools & Applications, vol. 76,no.8, pp.1-35.,2017 3. Aparna, Puvvadi , and P. V. V. Kishore , “Biometric-based efficient medical image watermarking in E-healthcare application,”IET Image Processing,vol .13,no.3 , pp.421-428,2019. 4. Aparna, Puvvadi , and P. V. V. Kishore , “An iris biometric-based dual encryption technique for medical image in e-healthcare application,” International Journal of Computational Vision and Robotics, vol.10,no.1,2020,:. 5. Raul R C, Claudia F U, Trinidad-Bias G J, “ Data Hiding Scheme for Medical Images,” Electronics, Communications and Computers, 2007. CONIELECOMP '07. 17th International Conference on. IEEE, pp.32-32,2007. 6. Singh A K, Kumar B, Dave M, et al , “Robust and imperceptible dual watermarking for telemedicine applications,” Wireless Personal Communications, vol.80,no.4, pp.1415-1433,2015 7. Aparna, Puvvadi , and P. V. V. Kishore , “A blind medical image watermarking for secure e-healthcare application using crypto-watermarking system,” Journal of Intelligent Systems ,2019. 8. Singh A K, Kumar B, Dave M, et al, “ Multiple watermarking on medical images using selective discrete wavelet transform coefficients,” Journal of Medical Imaging & Health Informatics, vol 5,no.3, pp.607-614,2015. 9. Ghouti, Lahouari , “ Robust perceptual color image hashing using randomized hypercomplex matrix factorizations,” Multimedia Tools and Applications ,vol77,no15,pp:19895-19929,2018 10. Cui, Yan , et al, “Supervised discrete discriminant hashing for image retrieval,” Pattern Recognition ,vol78,pp:79-90,2018.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VII (Issue IV): 48-52. (June 2020)1. Be My Eyes: Android Voice Application for Visually Impaired People by RuchaDoiphode, MayuriGanore, AshwiniGarud, TejaswiniGhuge, Parminder Kaur (Guide) Department Of Computer Science Engineering Dr.Babasaheb Ambedkar Marathwada University, Jawaharlal Nehru Engineering College, Aurangabad, India 2. A new Android application for blind and visually impaired people by PiotrKardyś, Adam Dąbrowski Division of Signal Processing and Electronic Systems Poznan University of Technology, Poznan, Poland. 3. P.Kardyś,A.Dąbrowski,“Standard Bluetooth Natlebezprzewodowy chsystemów telekomunikacy jnychkrót kiegozasięgu w aplikacjach bio-itelemedycznych”, Elektronika 52 (5), 5/2011, pp. 56–59. 4. R. E. Sorace, V. S. Reinhardt, and S. A. Vaughn, “High-speed digital-to-RF converter,” U.S. Patent 5 668 842, Sept. 16, 1997. (2002) The IEEE website. Online. Available: http://www.ieee.org/..
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , , , and . International Journal of Innovative Research in Information Security, Volume VII (Issue IV): 42 (46 2020)1. Dudgeon, D.E. and R.M. Mersereau, Multidimensional Digital Signal Processing. 1984, Englewood Cliffs, New Jersey: Prentice-Hall. 2. Castleman, K.R., Digital Image Processing. Second ed. 1996, Englewood Cliffs, New Jersey: Prentice-Hall. 3. Oppenheim, A.V., A.S. Willsky, and I.T. Young, Systems and Signals. 1983, Englewood Cliffs, New Jersey: Prentice-Hall. 4. Papoulis, A., Systems and Transforms with Applications in Optics. 1968, New York: McGraw-Hill. Russ, J.C., The Image Processing Handbook. Seconded. 1995, Boca Raton, Florida: CRC Press. 5. Giardina, C.R. and E.R. Dougherty, Morphological Methods in Image and Signal Processing. 1988, Englewood Cliffs, New Jersey: Prentice- Hall . 321. 6. Gonzalez, R.C. and R.E. Woods, Digital Image Processing. 1992, Reading, Massachusetts: Addison-Wesley. 716. 7. Goodman, J.W., Introduction to Fourier Optics. McGraw-Hill Physical and Quantum Electronics Series. 1968, New York: McGraw-Hill. 287..
    4 years ago by @ijiris
    (0)
     
     
  •  

    . International Journal of Innovative Research in Information Security, Volume IV (Issue IV): 36-40 (April 2020)1. https://cleartax.in/s/insurance 2. https://www.scribd.com/doc/10487143/Project-On-The-New-India-Assurance-Com-By-Sandeep-vaishnav 3. https://trendlyne.com/research-reports/stock/65182/NIACL/the-new-india-assurance-company-ltd/.
    4 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue V): 108-116 (July 2019)1. UNAIDS. (2018). The Global HIV/AIDS Epidemic. Retrieved August 2018, from hiv.gov: https://www.hiv.gov/hiv-basics/overview/data-and-trends/global-statistics 2. Kimberly, G. (2015). HIV service delivery models towards `zero AIDS related deaths. BMC Health service research.15(2) 12-15 3. Johnson, K. (2013). integration of HIV and family planning Health services in Sub-saharan Africa, DHS Analytical studies no. 30 Calverton, Maryland, USA. 4. Mutemwa, R. (2016). Perception and Experiences of Integrated Service Delivery Among Women Living with HIV Attending Reproductive Health Services in Kenya: A Mixed Methods Study. AIDS and behaviour, 20(9), 2130-40. 5. Bergh, A. (2015). Clinician Perceptions and Patient Experiences of ART Teatment and primary health care integration in ART clinics. AOSIS open journa, 38(1),1489l. 6. Sima, Belachew, & Abebe. (2017). Knowledge, Attitude and Perceived Stigma towards Tuberculosis among Pastoralists. Plos one, 12(7), 18-32 7. Pathmanathan, Munyaradzi, Sherri, Dokubo, Preko, Mazibuko, et al. (2017). High Uptake of Antiretroviral Therapy among HIV-positive TB Patients Receiving co-located Services in Swaziland. plos one, 13(5). 196-831 8. Buh, W., Peter, N., & Atashili, J. (2016). Clients satisfaction with HIV treatment services in Bamenda, Cameroon. BMchC Health services Resear, 16(1), 280. 9. Kikuvi, J. (2014). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. International Aids Society. 10. Kioko, J. (2015). Are integrated HIV services less stigmatizing than stand alone models of care? A comparative case study from Swaziland. Journal Of International Aids Society, 16(1), 9-12. 11. National AIDS Control Council,NACC. (2016). Kenya HIV County Profiles. Nairobi: Ministry Of Health 12. Odeny. T, K. J. (2013). Intergration of HIV Core with Primary Health Care services:Effects of patient satisfaction and stigma in Rural Kenya. AIDS Resersch and Treatment, 20(2), 4-8..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume VI (Issue IV): 102-107 (May 2019)1. Arampatzis, T., et al. (2005) A Survey of Security Issues in Wireless Sensors Networks, in Intelligent Control. Proceeding of the IEEE International Symposium on, Mediterrean Conference on Control and Automation, 719-724. 2. Anna Gerber,” Simplify your IoT solution with IoT Architecture, IBM Document, 2017 3. Computing and its role in the internet of things,” in Proceedings of the 1st ACM MCC Workshop on Mobile Cloud Computing, pp. 13–16, 2012 4. Charith Perera, Chi Harold Liu, Srimal Jayawardena―The Emerging Internet of Things marketplace From an Industrial Perspective: A Survey”,IEEE transactions on emerging topics in computing‖, 31 Jan 2015. 5. Chen, X.-Y. and Jin, Z.-G. (2012) Research on Key Technology and Applications for the Internet of Things. Physics Procedia, 33,561-566. http://dx.doi.org/10.1016/j.phpro.2012.05.104 6. F. Bonomi, R. Milito, P. Natarajan, and J. Zhu, “Fog computing: a platform for internet of things and analytics,” in Big Data and Internet of Things: A RoadMap for Smart Environments, pp. 169–186, Springer, Berlin, Germany, 2014. 7. J. Gubbi, R. Buyya, S. Marusic, and M. Palaniswami,“Internet of Things (IoT): a vision, architectural elements,and future directions,” Future Generation Computer Systems, vol. 29, no. 7,pp. 1645–1660, 2013. 8. Jayavardhana, G., Rajkumar, B., Marusic, S. and Palaniswami, M. (2013) Internet of Things: A Vision, Architectural Elements, and Future Directions. Future Generation. 9. Sebastian, S., Ray, P.P., 2015. Development of IoT invasive architecture for complying with health of home. In: Proceedings of I3CS, Shillong, pp. 79–83. 10. Somayya Madakam, R. Ramaswamy, Siddharth Tripathi Internet of Things (IoT): A Literature Review Journal of Computer and Communications, 2015, 3, 164-173. Published Online May 2015 in SciRes. 11. Tuhin Borgohain, Uday Kumar, Sugata Sanyal,”Survey of Security and Privacy Issues of Internet of Things” Int. J. Advanced Networking and Applications Volume: 6 Issue: 4 Pages: 2372-2378 (2015) ISSN: 0975-0290. 12. The Internet of Things Reference Model, Whitepaper from Cisco 13. The Intel IoT platform, Architecture Specification White paper 14. Zeeshan Javeed,” Edge Analytics, the pros and cons of immediate local insight, 2017 blog ..
    5 years ago by @ijiris
    (0)
     
     
  •  

    , , and . IRJCS:: International Research Journal of Computer Science, Volume VI (Issue III): 38-46 (March 2019)1. R. Buyya, C. S. Yeo, S. Venugopal, J. Broberg, and I. Brandic, "Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility," Future Generation computer systems, vol. 25, pp. 599-616, 2009. 2. P. Mell and T. Grance, "The NIST definition of cloud computing," 2011. 3. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, et al., Ä view of cloud computing," Communications of the ACM, vol. 53, pp. 50-58, 2010. 4. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, et al., Äbove the clouds: A berkeley view of cloud computing," Technical Report UCB/EECS-2009-28, EECS Department, University of California, Berkeley2009. 5. I. Foster, Y. Zhao, I. Raicu, and S. Lu, "Cloud computing and grid computing 360-degree compared," in Grid Computing Environments Workshop, 2008. GCE'08, 2008, pp. 1-10. 6. B. Hayes, "Cloud computing," Communications of the ACM, vol. 51, pp. 9-11, 2008. 7. D. Nurmi, R. Wolski, C. Grzegorczyk, G. Obertelli, S. Soman, L. Youseff, et al., "The eucalyptus open-source cloud-computing system," in Cluster Computing and the Grid, 2009. CCGRID'09. 9th IEEE/ACM International Symposium on, 2009, pp. 124-131. 8. R. N. Calheiros, R. Ranjan, A. Beloglazov, C. A. De Rose, and R. Buyya, "CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms," Software: Practice and experience, vol. 41, pp. 23-50, 2011. 9. L. M. Vaquero, L. Rodero-Merino, J. Caceres, and M. Lindner, Ä break in the clouds: towards a cloud definition," ACM SIGCOMM Computer Communication Review, vol. 39, pp. 50-55, 2008. 10. S. Marston, Z. Li, S. Bandyopadhyay, J. Zhang, and A. Ghalsasi, "Cloud computing—The business perspective," Decision support systems, vol. 51, pp. 176-189, 2011. 11. A. D. Basha, I. N. Umar, and M. Abbas, "Mobile applications as cloud computing: implementation and challenge," International Journal of Information and Electronics Engineering, vol. 4, p. 36, 2014. 12. C. Shravanthi and H. Guruprasad, "Mobile cloud computing as future for mobile applications," International Journal of Research in Engineering and Technology, vol. 3, pp. 2319-2322, 2014. 13. N. Patil, N. Patil, A. Bagal, M. Desai, and A. Bhosale, "Development of Android Mobile Application for Cloud Video Streaming using Mobile Cloud Computing." 14. A. D. Basha, "Modeling E-Learning Readiness among Instructors in Iraqi Public Universities," Universiti Sains Malaysia, 2015. 15. K. Patil and S. Patil, Ä CASE STUDY ON MOBILE CLOUD COMPUTING." 16. M. A. Mahmod, A. B. M. Ali, A. R. B. Ahlan, A. Shah, and M. S. A. Seman, "E-learning in Iraqi universities: A review," in Computing, Engineering, and Design (ICCED), 2017 International Conference on, 2017, pp. 1-4. 17. A. D. Basha, S. H. Mnaathr, I. N. Umar, and R. Jamaludin, "Insight on Protection of Universities Networks Information Security: The Problems and the Solutions," 2013. 18. E. M. Morgado and R. Schmidt, "Increasing Moodle resources through cloud computing," in Information Systems and Technologies (CISTI), 2012 7th Iberian Conference on, 2012, pp. 1-4. 19. M. Wang, Y. Chen, and M. J. Khan, "Mobile cloud learning for higher education: A case study of Moodle in the cloud," The International Review of Research in Open and Distributed Learning, vol. 15, 2014. 20. V. Siládi and V. Mižúrová, "LMS Moodle on Computing Cloud," in 4th Interantional Scientific Conference in V4 Countries, Applied Natural Sciences, Trnava, 2013. 21. V. Kumar and D. Sharma, "Creating Collaborative and Convenient Learning Environment Using Cloud-Based Moodle LMS: An Instructor and Administrator Perspective," International Journal of Web-Based Learning and Teaching Technologies (IJWLTT), vol. 11, pp. 35-50, 2016. 22. N. Sclater, "eLearning in the Cloud," International Journal of Virtual and Personal Learning Environments, vol. 1, pp. 10-19, 2012..
    5 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue VIII): 471-474 (September 2018)1. K. Wu and C. Wang, “Steganography using reversible texture synthesis” IEEE Transactions on Image Processing Vol.24 pp 130-139,January 2015 2. Shreyank N Gowda, “An Advanced Diffie-Hellman Approach to Image Steganography ” IEEE Transactions on advance network and telecommunication system Vol.19 pp 1-4,june 2016 3. Sherin Sugathan, “An Improved LSB Embedding Technique for Image Steganography ” International conference on applied and theoretical computing and communication technology Vol.33 pp 609-612,2016 4. S. Singh and V. K. Attri Dual Layer Security of data using LSB Image Steganography Method and AES Encryption Algorithm International Journal of Signal Processing, Image Processing and Pattern Recognition Vol. 8, No. 5 , pp. 259-266 ,2015 5. Utsav Sheth and Shiva Saxena, “Image Steganography Using AES Encryption and Least Significant Nibble ” International conference on communication and signal processing Vol.11 pp 0876-0879,2016 6. Radu Pietraru, “Secure communication method based on encryption and steganography” International conference on control system and computer science Vol.31 pp 453-458,2017 7. Y Manjula and K B Shivakumar ,”Enhanced Secured Image Steganography using Double Encryption Algorithm” International Conference on Computing for Sustainable Global Development (IndiaCom),2016 8. Tanushree Shelare and Varsha Powar,”A secure transmission approach using B-Trees in steganography”International Conference on Automatic Control and Dynamic Optimization Techniques,2016 9. https://www.sans.org/reading-room/whitepapers/vpns/review-chaffing-winnowing-876 10. http://www.asp.net/: This is the official Microsoft ASP.NET web site. It has a lot of: tutorials, training videos, and sample projects. 11. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6850714&queryText%3Dimage+steganography 12. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6658020&queryText%3Dimage+steganography.
    6 years ago by @ijiris
    (1)
     
     
  •  

    . IJIRIS:: International Journal of Innovative Research in Information Security, Volume V (Issue IV): 21-24 (April 2018)1. Gary Stoneburner, Alice Goguen, and Alexis Feringa, "Risk Management Guide for Information Technology Systems", Recommendations of the National Institute of Standards and Technology, Special Publication 800-30, pp.1-5, July 2002 2. Richard Kissel, Kevin Stine, Matthew Scholl, Hart Rossman, Jim Fahlsing, Jessica Gulick, "Security Considerations in the System Development Life Cycle ",October 2008, pp. 2-3 3. Ugur Aksu, Hadi Dilek, ˙Islam Tatlı, Kemal Bicakci,˙Ibrahim Dirik,Umut Demirezen, Tayfun Aykır,Ä Quantitative CVSS- Based Cyber Security Risk Assessment Methodology For IT Systems", 23-26 Oct. 2017,IEEE 4. Daniel Tse, Zehan Xie, Zhaolin Song,Äwareness of information security and its implications to legal and ethical issues in our daily life",10-13 Dec. 2017,IEEE 5. Ayesha M. Talha, Ibrahim Kamel, Zaher Al Aghbari, "Enhancing Confidentiality and Privacy of Outsourced Spatial Data", 2015 IEE9E 2nd International Conference on Cyber Security and Cloud Computing, 2015 6. 074747474.5ark Stamp’s, “Information Security Principle and Practice”,Vol-4, Wiley Interscience, pp. 386, 405, 2006.
    6 years ago by @ijiris
    (0)
     
     
  •  

    , , , , and . IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XII): 01-07 (December 2017)1 Hugh A. Chipman, Edward I. George, and Robert E. McCulloch. “Bayesian CART Model Search.” Journal of the American Statistical Association, Vol. 93(443), pp 935–948, September 1998. 2 Sujata Garera, Niels Provos, Monica Chew, and Aviel D. Rubin. “A framework for detection and measurement of phishing attacks.” In Proceedings of the 2007 ACM workshop on Recurring malicious code - WORM ’07, page 1, 2007. 3 Abhishek Gattani, AnHai Doan, Digvijay S. Lamba, NikeshGarera, Mitul Tiwari, Xiaoyong Chai, Sanjib Das, Sri Subramaniam, AnandRajaraman, and VenkyHarinarayan. “Entity extraction, linking, classifica- tion, and tagging for social media.” Proceedings of the VLDB Endowment, Vol. 6(11), pp 1126–1137, August 2013. 4 David D. Lewis. Naive (Bayes) at forty: The independence assumption in information retrieval. pages 4–15. 1998. 5 Justin Ma, Lawrence K. Saul, Stefan Savage, and Geoffrey M. Voelker. “Learning to detect malicious URLs.” ACM Transactions on Intelligent Systems and Technology, Vol. 2(3), pp 1–24, April 2011. 6 FadiThabtah Maher Aburrous, M.A.Hossain, KeshavDahal. “Intelligent phishing detection system for e-banking using fuzzy data mining.” Expert Systems with Applications, Vol. 37(12), pp 7913–7921, Dec 2010. 7 AnkushMeshram and Christian Haas. “Anomaly Detection in Industrial. Networks using Machine Learning: A Roadmap.” In Machine Learning for Cyber Physical Systems, pages 65–72. Springer Berlin Heidelberg, Berlin, Heidelberg, 2017. 8 Xuequn Wang Nik Thompson,Tanya Jane McGill. “Security begins at home: Determinants of home computer and mobile device security behavior.” Computers & Security, Vol. 70, pp 376–391, Sep 2017. 9 Dan Steinberg and Phillip Colla. “CART: Classification and Regression Trees.” The Top Ten Algorithms in Data Mining, pp 179–201, 2009. 10 D. Teal. “Information security techniques including detection, interdiction and/or mitigation of memory injection attacks,” Google patents. Oct 2013. 11 Kurt Thomas, Chris Grier, Justin Ma, Vern Paxson, and Dawn Song. “Design and Evaluation of a Real-Time URL Spam Filtering Service.” In 2011 IEEE Symposium on Security and Privacy, pp 447–462. May 2011. 12 Sean Whalen, Nathaniel Boggs, and Salvatore J. Stolfo. “Model Aggregation for Distributed Content Anomaly Detection.” In Proceedings of the 2014 Workshop on Artificial Intelligent and Security Workshop - AISec ’14, pp 61–71, New York, USA, 2014. ACM Press. 13 Ying Yang and Geoffrey I. Webb. “Discretization for Naive-Bayes learning: managing a discretization bias and variance.” Machine Learning, Vol. 74(1), pp 39–74, Jan 2009..
    6 years ago by @ijiris
    (1)
     
     
  •  

    , and . IJIRIS:: International Journal of Innovative Research Journal in Information Security, Volume IV (Issue XI): 01-04 (November 2017)1. Y Manjula, K B Shivakumar. Enhanced Secure Image Steganography using Double Encryption Algorithms, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 2. Aarti Singh, Manisha Malhotra. Hybrid Two-Tier Framework for Improved Security in Cloud Environment, at International Conference on Computing for Sustainable Global Development IEEE, 2016. 3. Vishwanath Mahalle, Aniket Shahade. Enhancing the data security in cloud by implementing Hybrid (RSA & AES) Encryption Algorithm, International journal of pure & applied research in engineering and technology, 2016. 4. Sakinah Ali Pitchay, Wail Abdo Ali Alhiagem, Farida Ridzuan, Madihah Mohd Saudi. A proposed system concept on Enhancing the Encryption and Decryption Method for Cloud Computing, 17th UKSIM-SMSS International Conference on Modelling and Simulation, 2015. 5. K.Yang, J.Xiaohua. Security for Cloud storage systems, Springer Brief in Computer Science, 2014. 6. C.K Chan, L.M Cheng. Hiding data in images by simple LSB substitution, Pattern Recognition, vol.37, pp. 469-474, 2014. 7. M.S Sutaone,M.V Khandare. Image based Steganography using LSB insertion Technique, IET International Conference, 2008. 8. Prof. Vishwanath S. Mahalle. Implementing RSA encryption algorithm to enhance the data security of cloud in cloud computing, International journal of pure & applied research in engineering and technology, 2013, volume 1(8):220-227, ISSN-2319-507X IJPRET..
    7 years ago by @ijiris
    (0)
     
     
  •  

     
  •  

     
  • ⟨⟨
  • 1
  • ⟩⟩