A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Prabu, R.
- Efficient Data Transfer by Using Clustering Techniques in Castle
Authors
Source
Data Mining and Knowledge Engineering, Vol 2, No 6 (2010), Pagination:Abstract
Data anonymization techniques based on k-Anonymity model have been the focus of intense research in the last few years. Although the k-Anonymity model provides valuable solutions to privacy-preserving, current solution are limited to the static data release (i.e.., the entire data set is assumed to be available at the time of release).Today as database continuously growing every day and even every hour. In such streaming applications, there is need to offer strong guarantees on the maximum allowed delay between incoming data and the corresponding anonymized output. To cope with these requirements CASTLE(Continuously Anonym zing Streaming data via adaptive cLustEring) a cluster based scheme is introduced that anonymized data streams and ensures the freshness of the anonymized data by satisfying specified delay constraints. In addition CASTLE has been extended to l-diversity requires that each equivalence class has at least l well represented values for each sensitive attributes.
Keywords
Data Stream, Privacy-Preserving Data Mining, Anonymity.- UPC:A Fairness Based Paradigm for Cohesive Cadre Management
Authors
1 Department of Information Technology, VelTech MultiTech Dr RR Dr SR Engineering College, Chennai, TamilNadu, IN
2 VelTech MultiTech Dr RR Dr SR Engineering College, Chennai, TamilNadu, IN
Source
Automation and Autonomous Systems, Vol 3, No 3 (2011), Pagination: 134-138Abstract
Large organizations, in particular public sector organizations contain many employees and they have grouped them into various cadres. Managing all these cadres is a tedious job. The benefits offered to the employees of different cadres may vary to a greater extent. This results in the occurrence of new problems. Due to this there is a high possibility of career growth imbalance for employees of some cadres while employees belonging to some other cadre with the same experience as the former cadre may achieve relatively high career growth. This scheme also results in limited scope for job rotation & job enrichment and stagnation beyond acceptable levels. In other words, it does not maintain a fairness level among the employees. Here we propose a new approach, Unified Professional Cadre (UPC) which eliminates the above said shortcomings of the existing scheme and offers a poised approach thereby integrating all the existing cadres of an organization under a single parasol. In UPC, all the employees fall under the same cadre which offers the same benefits to all. Promotions are offered based on a unified merit list for all the cadres. This merit list is based on the transactional, behavioral and course credits earned by the employees during a certain period of time. Seniority also plays a vital role in the creation of the unified merit list. This entire approach maintains fairness in all aspects of every employee’s bouquet of benefits. The benefits of UPC are multi skilling, role rotation, objective performance appraisal, equal weightage to all, etc.Keywords
Fairness Based Cadre Management, Administration Automation.- PB Verification and Authentication for Server using Multi Communication
Authors
1 Department of Computer Science and Engineering, Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
2 Department of Information Technology; Veltech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Chennai - 600062, Tamilnadu, India
Source
Indian Journal of Science and Technology, Vol 9, No 5 (2016), Pagination:Abstract
Objective: To provide Password authentication by cloud through performing tri stages and also to improve the security. Method: First stage is registration phase; it involves issuing of cloud space to user. Cloud space is used for storing all self information of the client which is used for checking authenticity for later usage. Password of user is generated by user or by server based on password user can registered into cloud. If registration process is completed, then users are able to access the server log-in whenever they needed. Protocol based verification and authentication for two different mediums (Duos) uses user's cell phones or mobile devices is used as SMS to avoid hacking of password and backtrack attack using password. Using unique phone number Duos system possesses website and involves a telecommunication service provider in recovery and registration phase-in Duos based authentication system user want to remember only the Long-Term Password (LTP) for login in all websites. Efficient and affordable authentication is provided by Duos. For successful login of user's, they need valid smartcard and correct password. It involves two-factor password phase and cloud space. Findings: Users able to change their password freely in password changing phase and update his/her information to cloud space. Applications/Improvements: The secured web authentication done successfully by using two types of registration which are named as Registration on Website and on the Mobile device. The scalability of the device is achieved.Keywords
Long Time Password (LTP), Mobile Device, QR Code, SOAP Protocol- Perception and Eradication of Energy Exhausting Attacks in WSN
Authors
1 Department of Computer Science and Engineering, St. Peter’s University, Avadi, Chennai - 600054, Tamil Nadu, IN
2 Department of Computer Science and Engineering, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
3 Department of Information Technology, Vel Tech Multitech Dr. Rangarajan Dr. Sakunthala Engineering College, Avadi, Chennai - 600062, Tamil Nadu, IN
4 Department of Computer Science and Engineering, ASET, Palakad - 678557, Kerala, IN
Source
Indian Journal of Science and Technology, Vol 9, No 22 (2016), Pagination:Abstract
Microwaves ad-hoc feeler groups are spatially distributed self governing sensors to examine physical or environmental conditions and for conveyance purposes. Besides all the comforts of the life wireless network spouses serious security threats. Here we implement a simulation based model by using both dynamic threshold algorithm and recursive algorithm and hidden terminal process is used to transfer the data packets to the outer region nodes without any hazards. The proposed method detects the attack and restrain from the attacker node in the network based on CS (Cognitive Sensing) node.Keywords
Cognitive Sensing, Dynamic Multicast Routing Protocol, Denial of Service, Hidden Terminal Communication Scheme, Recursive Algorithm, Wireless Sensor Network.- Condition Monitoring of Focusing Nozzle in Abrasive Water Jet Machine using Sound Sensor
Authors
1 Department of Mechanical Engineering, St. Joseph’s College of Engineering, Old Mamallapuram Road, Semmencherry, Chennai – 600119, Tamil Nadu, IN
2 Department of Mechanical, Krishnasamy College of Engineering and Technology, Nellikuppam Main Road, S. Kumarapuram, Cuddalore – 607109, Tamil Nadu, IN