A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Abirami, K.
- Vulnerability Management in Web Applications
Authors
1 Department of CSE, SMVEC, Puducherry, IN
Source
Data Mining and Knowledge Engineering, Vol 5, No 4 (2013), Pagination: 162-167Abstract
Web applications consist of several different and interacting technologies. These interactions between different technologies can cause vast security problems. As organizations are taking their businesses online they make their systems accessible to the world. They might have a firewall in place and possibly even their web server is running an up-to-date version of its software but that is not enough to protect their resources. Web applications become integral part in our day today life. Recent studies proves that more than fifty percent of the cost of software development is expend towards for testing, even though the software web applications is not free from its critical issues. Vulnerabilities provides more critical outcome in web applications instead in various researches have been involved with major impact of vulnerabilities. Recently the web applications are tested with minimal parameters. The main objective of proposed work is to reduce the time consumption and high cost for software testing. And in this paper we also tell about other possible vulnerabilities and their control measures. Using static analysis the critical vulnerabilities are analyzed where the issues are arising in web applications. The critical vulnerabilities such as handling catch block, encrypted password, execution failure in exception handling and redirecting the values of parameter. Depends on the severity of the issues the vulnerabilities are classified with the solutions.Keywords
Cross-Site Scripting (XSS), Empty Catch Block, Open Redirect SQL Injection, Storing Passwords in a Recoverable Format, Uncaught Exception.- Emerging Trends in Mobile Health Care System with Different Algorithms
Authors
1 Department of CSE, SMVEC, Puducherry, IN
Source
Artificial Intelligent Systems and Machine Learning, Vol 5, No 7 (2013), Pagination: 349-355Abstract
Mobile technologies are increasingly growing in developing countries like India Mobile healthcare provision in the home environment presents many challenges. Mobile Healthcare is a term used for the practice of medicine and public health supported by mobile devices. It is most commonly used in the reference to using mobile communication devices such as mobile phones, tablet & computer PDAs. Nowadays, mobile has become a prominent tool, not only in urban regions but also in remote and rural areas. Mobile healthcare, in the home environment presents many new challenges. A wireless sensor network with a large number of sensor nodes can be used as an effective tool for gathering data in mobile healthcare situations. The work includes a detailed study of mobile healthcare system in various aspects. Various algorithms and techniques, for effective healthcare are addressed in this paper. After analyzing, the survey is concluded with several promising directions for further research in mobile healthcare system.Keywords
Bilinear Pairing Techniques, Mobile Health Care System, Wireless Sensor Network, Collaborative Algorithm, Recommendation Algorithm.- Novel Techniques to Save Energy and Memory of Surveillance during Wildlife Footage
Authors
Source
Wireless Communication, Vol 10, No 7 (2018), Pagination: 124-126Abstract
With the advent of technology, embedded systems play a major role in various fields. In early stages for shooting wildlife videos and photos, the photographers used to spend more time for a single shot. The major disadvantage is that the shot taken may not be the required shot, so the work and energy used may be wasted. To overcome the above mentioned problem the surveillance system method was introduced. This proposed system will rectify the above mentioned problems with high efficiency. The NOOBS software is used for interfacing the hardware components and python is used as coding language. The working of surveillance system is as follows, when the camera is said to be turned ON, it will keep recording the whole footage without any human touch. When the obstacles are detected by PIR sensor, the PI camera is turned ON and it is identified by LED. The obstacles are captured by the camera and the captured footage is taken from the fixed location. If the obstacle goes out of range, the camera goes to sleep mode, which results in saving the power.