A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sharmila, K.
- Diagnosing Diabetic Dataset using Hadoop and K-means Clustering Techniques.
Authors
1 Department of Computer Science, Vels University, Chennai - 600117, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 9, No 40 (2016), Pagination:Abstract
Objectives: The articles display how enormous measure of information in the field of social insurance frameworks can be dissected utilizing grouping method. Removing helpful data from this gigantic measure of information is profoundly compound, exorbitant, and tedious, in such territory information mining can assume a key part. Specifically, the standard information digging calculations for the examination of colossal information volumes can be parallelized for speedier preparing. Methods/Statistical Analysis: This paper concentrate on how grouping calculation to be specific K-means can be utilized as a part of parallel handling stage in particular Apache Hadoop bunch (MapReduce paradigm huge) so as to dissect the gigantic information quicker. Findings: As an early point, we complete examination keeping in mind the end goal to evaluate the adequacy of the parallel preparing stages as far as execution. Applications/Improvements: Based on the final result, it shows that Apache Hadoop with K-means cluster is a promising example for versatile execution to anticipate and analyze the diabetic infections from huge measure of information. The proposed work will give an insight about the big data prediction of diabetic dataset through Hadoop. In future this technology has to be extended on cloud so as to connect various geographic districts around Tamil Nadu to predict diabetic related diseases.Keywords
Apache Hadoop, K-means, MapReduce.- A Survey on User Authentication Techniques
Authors
1 Department of CSE, Aurora’s Research and Technological Institute, Warangal, Telangana, IN
2 Department of CSE, Vaagdevi College of Engineering, Warangal, Telangana, IN
3 Department of CSE, Central University of Rajasthan, Rajasthan, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 2 (2017), Pagination: 513-519Abstract
Confidentiality and Authentication were once treated different but now-a-days, improvement in technology is demanding both of them to be used together. Though technology is increasing tremendously, smart hackers on the environment always challenges the authentication factors, thereby enforcing more number of factors for authentication to be included. As factors increase, failure rate for authentication may also be more when any one of the factors doesn't work. A qualitative survey of user authentication systems being used in today's environment is presented here and a comparative study of various authentication mechanisms used in the world of Information security by various researchers is shown.Keywords
Authentication, Cryptography, Smart Cards, Social Authentication, Tokens, Vouching.References
- Haga, W. J. and M. Zviran, Cognitive Passwords: From Theory to Practice, Data Processing and Communications Security. In 8th Conference on exploring the challenges on e-business, 2009; 13(3): pp. 19-23.
- Moshe Zviran, Zippy Erlich, Identification and authentication: technology and implementation issues. In Communications of AIS, Volume 17, Article 4.
- John Brainard, Ari Juels, Ronald L. Rivest, Michael Szydlo, Moti Yung, Fourth Factor Authentication: Somebody You Know. In Proc. of the 13th ACM Conference on Computer and communications security, 2006; pp. 168-178.
- John Brainard, Ari Juels, Burt Kaliski, Michael Szydlo, A new two-server approach for authentication with short secrets. In Proc. Int, conf. on USENIX Security Symposium , 2003; pp 14.
- Stuart Schechter, Serge Egelman, Robert W. Reeder, It’s Not What You Know, But Who You Know: A social approach to last-resort authentication, CHI 2009, Boston, USA
- Stephen S. Hamilton, Martin C. Carlisle, and John A. Hamilton, A Global Look at Authentication. In Proc. of IEEE Workshop on Information Assurance and security workshop, 2007.
- Fadi Aloul, Syed Zahidi, Wassim El-Hajj, Two Factor Authentication Using Mobile Phones, In The 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA, 2009.
- Muthucumaru Maheswaran, Bijan Soleymani, Social Authentication Protocol for Mobile Phones. In Proc. IEEE 16th Int. Conf. on Computational Science and Engineering, 2009; pp: 436-444.
- Brostoff and A. M. Sasse, Ten strikes and you’re out: Increasing the number of login attempts can improve password usability. In Proc. Int. Conf on HCI and Security Systems, 2003.
- Magno, Marianna B. Monterey, Survey of user authentication mechanisms. Naval Postgraduate School: Monterey, CA 93943-5000.
- Yang, G., Wong, D. S., Wang, H. & Deng, X, Two-factor mutual authentication based on smart cards and passwords. In Journal of Computer and System Sciences, 2008; pp. 1160-1172.
- Payas GUPTA, Exploiting Human Factors in User Authentication, Institutional Knowledge at Singapore Management University, 2013.
- Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. In IEEE Transactions on Parallel and Distributed Systems, 2011; pp 1390-1397
- Jiøí Sobotka, Radek Doležel, Multifactor authentication systems. In electro revue, vol. 1, 2010.
- Fabian Monrose, Michael K. Reiter, Qi Li, and Susanne Wetzel, Cryptographic key generation from voice. In Proc. Int. Conf on Security and Privacy, 2001.
- Gkarafli, S. & Economides, An experimental survey and comparison of proof by knowledge authentication techniques. International Journal of Applied Research on Information Technology and Computing, 2010.
- Sung Choi and David Zage, Addressing Insider Threat using “Where You Are” as Fourth Factor Authentication, In IEEE International Carnahan Conference on Security Technology, 2012; pp. 147-153.
- Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou, Robert H. Deng, A Generic Framework for Three-Factor Authentication: Preserving Security and Privacy in Distributed Systems. In IEEE Transactions, 2011; pp 1390-1397.
- Assess the Health Hazards of the Chiffoniers in Lucknow City
Authors
1 Department of Human Development and Family Studies/School of Home Science, Babasaheb Bhimrao Ambedkar University (A Central University), Lucknow – 226025, Uttar Pradesh, IN
Source
Journal of Ecophysiology and Occupational Health, Vol 20, No 3&4 (2020), Pagination: 128-133Abstract
Background: Chiffoniers are casual specialists who gather recyclable materials to win a little compensation on regular schedule. Their life and working conditions are amazingly troublesome. This paper inspected the wellbeing perils of the chiffonier working in dumping ground of slum areas. Aim: This purpose of this study was to assess the health problems of the chiffonier. Methods: This study collected data by interviewing 120 chiffoniers in Lucknow city. The health hazards were assessed using a self-made interview schedule. Snowball sampling was used to choose the data. Results: The study shows waste pickers suffer from physical health hazards. The purpose behind occupied with such sort of work is expected not having some other abilities and simple or day by day earnings. They faced problem redness of eyes; headache, back pain, skin infections, allergy cut and accidental injuries are very common among chiffoniers. Conclusion: The finding of the study, it can be concluded that chiffoniers face many working health hazards. Majority of the waste pickers frequently report physical health problems during the work. The chiffoniers suffer from several of health harms which seem related to their employment. Chiffoniers faced general problem identity crises, police and public abuses, poor health condition and no job security. Mostly chiffoniers faced different type’s health problems at the workplace in daily life.
Keywords
Chiffonier, Daily Income, Health Problems, Informal Worker, Working ConditionReferences
- Agaralla R, Pathak R, Singh M, Islam F, Parashar M. Effectiveness of awareness package on occupational health hazards among rag pickers of New Delhi, India. Community Medicine, Hamdard Institute of Medical Sciences and Research, Hamdard Nagar New Delhi, India. 2016; 2015(4): 367-69.
- Rani M. Problem faced and safety instrument used by female rag pickers involve in informal sector area of District, Sirsa, Haryana. International Journal of Research in Social Sciences. 2018; 8(4): 48-87.
- Silva D. C.M., Fassa G. A., Kriebel. D. Minor psychiatric disorder Brazilian ragpickers: a cross- sectional study. Environmental Health: A Global Access Science Source. 2006; 5(17): 1-10.
- Godara SA, Rani M. Socio economic aspects of female rag pickers involve in informal sector in urban area of district, Sirsa Haryana. International Journal of Academic Research and Development. 2018; 1(3): 819-23.
- Naaz S. Health hazards and social stigma faced by rag pickers in Delhi, International Journal of Research in Engineering, Science and Management. 2019; 2(5): 804-7.
- Wazid WS, Sharma R. Understanding the problems faced by Rag pickers in Guwahati City. Department of Social Work, Assam Don Bosco University, Guwahati. 2017: 1-35.
- Soni P. Problem and situation of girl rag pickers in National Capital Territory of Delhi. Alcoholism and Drug Dependence. 2014; 2(4): 1-7.
- Devi SK, Swamy SVVA, Krishna HR. Studies on the waste collection by rag pickers at Greater Hyderabad Municipal Corporation, Journal India. International Research of Environment Sciences. 2014; 3(1): 13-22.
- Chandramohan A., Ravichandran C., Sivasankar V. Solid waste, its health impairments and role of rag pickers in Tirchirappali City, Tamil Nadu, Southern India. Sage Journals Waste Management and Research. 2009 https://doi.org/101177/o73424x 09352705.
- Mote MB, Kadam BS, Kalaskar KS, Thakre SB, Adhav SA, Muthuvel T. Occupational and environmental health hazards ( physical and mental ) among rag pickers in Mumbai slums, A Cross Sectional Study, Science Journal of Public Health. 2016; 4(1): 1-10. https://doi.org/10.11648/j.sjph.20160401.11