A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sivachandrian, S.
- A Robust Elliptical Based Security using Cryptography Technique
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 3 (2016), Pagination: 53-57Abstract
With the increase of networked electronic communication came overwhelming capabilities to collect, process, combine and store data, resulting in previously unseen transformational pressure on the concepts of trust, security and privacy as we know them. In the Future all the work will be made digitalized. Technology development for data linking and mining, will lead to unwarranted access to personal data, and hence, privacy intrusion. Trust and identity lie at the basis of many human interactions and transactions, and societies have developed legitimate concern for privacy being essential for freedom and creativity. The up-and-coming development of the Information Society shows the readiness to respond to the transformational change evoked by ICT. We have reached the eleventh hour for the safeguarding of trust and privacy as elements that can be transposed into our digital future. The Cryptography plays major role in securing data while transmission. There are several cryptographic techniques introduced to secure data in the current world. In future the technology may improve in such a way that the current cryptographic technique may enhance the security of the data. Hence the cryptographic requirements must also be improved.
Keywords
Cryptography, Unauthorized, Elliptical Curve, UNICODE.- Emergency Alert System Using Location Based Identification for Android Text Message Services
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 4 (2016), Pagination: 97-99Abstract
Emergency alert system (EMS) people sending text messages android app services for Short Message Service (SMS) is a text based messaging service. Bulk messages cannot be sent during emergencies due to network traffic. Thus a wide range of organizations including colleges and universities now partner with third-party providers that promise to improve physical security by rapidly delivering such messages. Android app design for all services provides only emergency number button click for 1.police 2.hospital 3.fire 4.medeia 5.Military…and etc. 1. Police click button conformation yes/no type yes means send to message GPS location tracing information for system. The stored for client side the police station system and used to user send the message Police response to the notification for 10 minute delivery to user send message. Nearest police coming any accident solving problem. Emergency Alert System (EAS) using text messages as a security incident response mechanism. These techniques are useful in finding the minimum time for the delivery of all messages. We show emergency alert systems built on text messaging not only can meet the 10 minute delivery requirement mandated. The identification all area hospital list and used ambulance service to check the services.
Keywords
Emergency Alert System, GPS Services, Short Message Services, GSM, Emergency Response.- Volatile Profile of Cashew Apple Juice Fibers from Different Production Steps
Authors
Source
Biometrics and Bioinformatics, Vol 8, No 3 (2016), Pagination: 62-65Abstract
This study aimed to determine the volatile profile of cashew apple fibers to verify which compounds are still present after successive washings and thus might be responsible for the undesirable remaining cashew-like aroma present in this co-product, which is used to formulate food products like vegetarian burgers and cereal bars. Fibers were obtained from cashew apple juice processing and washed five times in an expeller press. Compounds were analyzed by the headspace solid-phase micro extraction technique (HS-SPME) and gas chromatography-mass spectrometry (GC-MS), using a DB-5 column. Sensory analysis was also performed to compare the intensity of the cashew-like aroma of the fibers with the original juice. Altogether, 80 compounds were detected, being esters and terpenes the major chemical classes. Among the identified substances, 14 were classified as odoriferous in the literature, constituting the matrix used in the Principal Component Analysis (PCA).Development of a deodorization process should include reduction of pressing force and stop at the second wash, to save water and energy, thus reducing operational costs and contributing to process sustainability.