oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2020 ( 1 )

2019 ( 192 )

2018 ( 243 )

2017 ( 243 )

Custom range...

Search Results: 1 - 10 of 144384 matches for " B. B. Meshram "
All listed articles are free for downloading (OA Articles)
Page 1 /144384
Display every page Item
Digital Forensics and Cyber Crime Datamining  [PDF]
K. K. Sindhu, B. B. Meshram
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.33024
Abstract: Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.
Peak-to-Average Power Ratio Reduction in OFDM system through Coding technique using AWGN Channel
Ms Snehal B.Meshram
International Journal of Engineering Trends and Technology , 2013,
Abstract: One of the challenging issues for OrthogonalFrequency Division Multiplexing (OFDM) system is its high Peak-to-Average Power Ratio (PAPR). In this paper, we review and analysis different OFDM PAPR reduction techniques, based on computational complexity, bandwidth expansion, spectral spillage and performance The sub-block complement coding (SBCC) complement block coding (CBC), cyclic coding (CC), simple block coding (SBC), modified simple block coding (MSBC) and simple odd parity code (SOPC) are the codes in which there is PAPR Reduction but the problem with this codes is in the limitation of frame size. But under the same coding rate, the PAPR reduction obtained by using Sub band coding is better than the rest schemes. The flexibility on choosing the coding rate and low complexity makes that the proposed scheme Sub band coding is more suitable for the large frame size with high coding rate and can provide error detection..We also discuss some methods of PAPR Reduction.
Content Based Video Retrieval Systems
B V Patel,B B Meshram
International Journal of UbiComp , 2012,
Abstract: With the development of multimedia data types and available bandwidth there is huge demand of video retrieval systems, as users shift from text based retrieval systems to content based retrieval systems. Selection of extracted features play an important role in content based video retrieval regardless of video attributes being under consideration. These features are intended for selecting, indexing and ranking according to their potential interest to the user. Good features selection also allows the time and space costs of the retrieval process to be reduced. This survey reviews the interesting features that can beextracted from video data for indexing and retrieval along with similarity measurement methods. We also identify present research issues in area of content based video retrieval systems.
Content based video retrieval systems
B V Patel,B B Meshram
Computer Science , 2012, DOI: 10.5121/iju.2012.3202
Abstract: With the development of multimedia data types and available bandwidth there is huge demand of video retrieval systems, as users shift from text based retrieval systems to content based retrieval systems. Selection of extracted features play an important role in content based video retrieval regardless of video attributes being under consideration. These features are intended for selecting, indexing and ranking according to their potential interest to the user. Good features selection also allows the time and space costs of the retrieval process to be reduced. This survey reviews the interesting features that can be extracted from video data for indexing and retrieval along with similarity measurement methods. We also identify present research issues in area of content based video retrieval systems.
Content based video retrieval
B. V. Patel,B. B. Meshram
Computer Science , 2012, DOI: 10.5121/ijma.2012.4506
Abstract: Content based video retrieval is an approach for facilitating the searching and browsing of large image collections over World Wide Web. In this approach, video analysis is conducted on low level visual properties extracted from video frame. We believed that in order to create an effective video retrieval system, visual perception must be taken into account. We conjectured that a technique which employs multiple features for indexing and retrieval would be more effective in the discrimination and search tasks of videos. In order to validate this claim, content based indexing and retrieval systems were implemented using color histogram, various texture features and other approaches. Videos were stored in Oracle 9i Database and a user study measured correctness of response.
Information Security Strategy- A new approach
Mrs. Aparna Chaudhuri Prof. B. B. Meshram
International Journal of Electronics Communication and Computer Engineering , 2011,
Abstract: Small and medium enterprises(SMEs) are gradually believing that information is an asset and like any other asset it needs to be strategically managed and protected. In most of the SMEs developing a strategy and then implementing the security measures are avoided or are considered as redundant. So in most of the cases it leaves loop holes in Information Security which result into threats and financial loss in the future. To improve security in a SME Purser’s proactive approach, with a little modification, is especially helpful. In this approach the process of preparing the strategy is explained in eight steps
Client Side CSRF Defensive Tool
Rupali kombade,B.B. Meshram
International Journal of Information and Network Security (IJINS) , 2012, DOI: 10.11591/ijins.v1i3.707
Abstract: Cross Site Request Forgery (CSRF) attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. Various defensive mechanisms have been suggested for CSRF but none of them provides complete protection against it. Few of these are client side tools and other needs both client as well as server side implementation. Maximum of these works for Reflected CSRF and very few has taken a note of stored CSRF. So to handle protect web applications securely, strong and client side protection against CSRF is needed. In this paper we have proposed CSRF defensive tool which provide complete CSRF protection. This is client side tool and not disturbs server side functionality. It can be implemented on browser as a plug-in. This tool works for both stored as well as reflected CSRF attack.
A Data mining approach for Monsoon prediction using Satellite image data
Dinu John,Dr. B. B. Meshram
International Journal of Computer Science and Communication Networks , 2012,
Abstract: The onset of monsoon is eagerly awaited in the Indian sub-continent as it has deep impact in the economic and social domain. It has been monitored and studied in great depth. With the advent of satellite imagery, it’s now possible to monitor the different parameters which affect or gets affected by the monsoon in a more global scale. In this paper, the onset of monsoon is predicted based on the features extracted from satellite images using data mining approach
Digital Forensic Investigation Tools and Procedures
K. K. Sindhu,B. B. Meshram
International Journal of Computer Network and Information Security , 2012,
Abstract: Due to the significance of Data, in this new age, its’ security has become a major issue in the I.T. industry. Cyber attacks from various sources are demanding its prevention in the new era of information security. Digital forensic is a relatively new fields that is the collection, analysis and documentation of a Cyber attacks. It is becoming increasingly important as criminals aggressively expand the use of technology in their enterprise of illegal activities. Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and analysis of digital evidence. A small percentage of cyber criminals being convicted confirm the difficulty in detection of digital crime and its consequent procedural proving in the court of law. An established forensic analyst mines the crucial evidence from susceptible locations to comprehend attacker’s intension. The typical goal of an investigation is to collect evidence using generally acceptable methods in order to make the evidence is accepted and admitted on the court. Efficient digital Tools and procedures are needed to effectively search for, locate, and preserve all types of electronic evidence. Main focus of this paper is the complete investigation procedure of storage media. Our paper also explains emerging cyber crimes and its digital forensic investigation procedures using digital forensic tools and techniques.
CSRF Vulnerabilities and Defensive Techniques
Rupali D. Kombade,B.B. Meshram
International Journal of Computer Network and Information Security , 2012,
Abstract: Web applications are now part of day to day life due to their user friendly environment as well as advancement of technology to provide internet facilities, but these web applications brought lot of threats with them and these threats are continuously growing, one of the these threat is Cross Site Request Forgery(CSRF). CSRF attack is immerged as serious threat to web applications which based on the vulnerabilities present in the normal request response pattern of HTTP protocol. It is difficult to detect and hence it is present in most of the existing web applications. CSRF attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. It is listed in OWASP’s top ten Web Application attacks list. In this survey paper we will study CSRF attack, CSRF vulnerabilities and its defensive measures. We have compared various defense mechanisms to analyse the best defense mechanism. This study will help us to build strong and robust CSRF protection mechanism.
Page 1 /144384
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.