2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Mar 5, 2021
Computer network and virtual machine security is very essential in today’s era. Various architect... more Computer network and virtual machine security is very essential in today’s era. Various architectures have been proposed for network security or prevent malicious access of internal or external users. Various existing systems have already developed to detect malicious activity on victim machines; sometimes any external user creates some malicious behavior and gets unauthorized access of victim machines to such a behavior system considered as malicious activities or Intruder. Numerous machine learning and soft computing techniques design to detect the activities in real-time network log audit data. KKDDCUP99 and NLSKDD most utilized data set to detect the Intruder on benchmark data set. In this paper, we proposed the identification of intruders using machine learning algorithms. Two different techniques have been proposed like a signature with detection and anomaly-based detection. In the experimental analysis, demonstrates SVM, Naïve Bayes and ANN algorithm with various data sets and demonstrate system performance on the real-time network environment.
International Journal of Advance Research and Innovative Ideas in Education, 2017
Serratia marcescens isolated from soil and identified on the basis of biochemical characteristics... more Serratia marcescens isolated from soil and identified on the basis of biochemical characteristics. This isolate was identified to produce extracellular Dnase, this isolate was subjected to molecular characterization by 16srRNA analysis. This sequenced sample was analysed for nucleotide matching from gene bank by the nucleotide blast. The strain showed 89% sequence similarity with Serratia marcescens Strain MTRI3 and labeled as Serratia marcescens.
Investigations were made in the present study to screen new strain designated as S. marcescens wa... more Investigations were made in the present study to screen new strain designated as S. marcescens was isolated. The parameter viz., temperature, pH, oil substrate, amino acid, carbon source, nitrogen sources and time were optimized to increase the production of prodigiosin. It was observed maximum amount of prodigiosin was produced at temperature 30°C and pH 7.0. Among the different sugar substrates tested, 0.4% mannose when amended in the medium yielded maximum Prodigiosin 400 mg/mL. Oil substrate plays a vital role in prodigiosin production. Among the various oil substrates used for the production of prodigiosin was maximum 500 mg/mL, when the medium was amended with peanut oil 0.1%. Amino acids like combination of 0.01%Methionine and 0.003% Cysteine was found effective, 0.1% Ammonium chloride supported maximum Prodigiosin production. Time required for maximum pigment production was also observed, it was found that 3 days time period required for maximum pigment production.
Data Mining has wide applications in numerous zones, for example, keeping money, prescription, in... more Data Mining has wide applications in numerous zones, for example, keeping money, prescription, investigative exploration and among government offices. Order is one of the ordinarily utilized assignments as a part of information mining applications. For as far back as decade, due to the ascent of different protection issues, numerous hypothetical and commonsense answers for the order issue have been proposed under diverse security models. Notwithstanding, with the late fame of distributed computing, clients now have the chance to outsource their information, in encoded structure, and also the information mining assignments to the cloud. Since the information on the cloud is in encoded structure, existing security protecting characterization methods are not appropriate. In this paper, system concentrates on fathoming the characterization issue over encoded information. Specifically, system proposes a classifier over scrambled information in the cloud. The index is created with the hel...
IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.5.0031 137 METHODOLOGY FOR HUMA... more IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.5.0031 137 METHODOLOGY FOR HUMAN SUSPICIOUS ACTIVITY DETECTION Tejashri Subhash Bora, Monika Dhananjay Rokade PG Student and Asst. Prof., Department of Computer Engg., SPCOE, Pune, India 2 boratej283@gmail.com, monikarokade04@gmail.com -----------------------------------------------------***-------------------------------------------------Abstract: The crime is increasing day by day. So for the security, the demands for surveillance cameras are also increased. Surveillance cameras are more and more being used in public places e.g. streets, intersections, banks, shopping malls, etc. However, the monitoring ability of law enforcement agencies has not kept pace. The outcome is that there is a deficiency in the utilization of surveillance cameras and an unworkable ratio of cameras to human monitors. One critical task in video surveillance is detecting anomalous events such as traffic accidents, crimes or illegal activitie...
3 ABSTRACT: Nowadays, data are stored to a third party in cloud environments and query processing... more 3 ABSTRACT: Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to...
IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.4.0029 135 E-CERTIFICATE GENERA... more IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.4.0029 135 E-CERTIFICATE GENERATION USING BLOCKCHAIN FOR P2P NETWORK: AN OVERVIEW Saber Nasir Take, Prof. Monika D. Rokade PG Student: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Dumbarwadi, Otur, India Assistant Prof.: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Dumbarwadi, Otur, India Sabertake@gmail.com , monikarokade4@gmail.com
1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department... more 1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department of Computer Engg., SPCOE, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract Fake news are described with an intenation to misdirect or to delude the reader. We have presented a response for the task for fake news, individuls are clashing if not by large poor locators of fake news. For this reason new system is generated for fake news identification. The result of this project determines the actual fake news detection for social networks using machine learning. Number of peoples having social media accounts such as facebook, whatsapp, twitter,etc. This social network is main source of news. Because of the wide effects of the huge fake news, individuals are clashing if not by large poor locators of fake news. While these sytems are utilized to make an increasingly dynamic...
1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department... more 1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department of Computer Engg., SPCOE, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Fake news are described with an intention to misdirect or to delude the reader. We have presented a response for the task for fake news, individuals are clashing if not by large poor locators of fake news. For this reason new system is generated for fake news identification. The result of this project determines the actual fake news detection for social networks using machine learning. Number of peoples having social media accounts such as facebook, whatsapp, twitter,etc. This social network is main source of news. Because of the wide effects of the huge fake news, individuals are clashing if not by large poor locators of fake news. While these systems are utilized to make an increasingly dynamic...
2021 International Conference on Emerging Smart Computing and Informatics (ESCI), Mar 5, 2021
Computer network and virtual machine security is very essential in today’s era. Various architect... more Computer network and virtual machine security is very essential in today’s era. Various architectures have been proposed for network security or prevent malicious access of internal or external users. Various existing systems have already developed to detect malicious activity on victim machines; sometimes any external user creates some malicious behavior and gets unauthorized access of victim machines to such a behavior system considered as malicious activities or Intruder. Numerous machine learning and soft computing techniques design to detect the activities in real-time network log audit data. KKDDCUP99 and NLSKDD most utilized data set to detect the Intruder on benchmark data set. In this paper, we proposed the identification of intruders using machine learning algorithms. Two different techniques have been proposed like a signature with detection and anomaly-based detection. In the experimental analysis, demonstrates SVM, Naïve Bayes and ANN algorithm with various data sets and demonstrate system performance on the real-time network environment.
International Journal of Advance Research and Innovative Ideas in Education, 2017
Serratia marcescens isolated from soil and identified on the basis of biochemical characteristics... more Serratia marcescens isolated from soil and identified on the basis of biochemical characteristics. This isolate was identified to produce extracellular Dnase, this isolate was subjected to molecular characterization by 16srRNA analysis. This sequenced sample was analysed for nucleotide matching from gene bank by the nucleotide blast. The strain showed 89% sequence similarity with Serratia marcescens Strain MTRI3 and labeled as Serratia marcescens.
Investigations were made in the present study to screen new strain designated as S. marcescens wa... more Investigations were made in the present study to screen new strain designated as S. marcescens was isolated. The parameter viz., temperature, pH, oil substrate, amino acid, carbon source, nitrogen sources and time were optimized to increase the production of prodigiosin. It was observed maximum amount of prodigiosin was produced at temperature 30°C and pH 7.0. Among the different sugar substrates tested, 0.4% mannose when amended in the medium yielded maximum Prodigiosin 400 mg/mL. Oil substrate plays a vital role in prodigiosin production. Among the various oil substrates used for the production of prodigiosin was maximum 500 mg/mL, when the medium was amended with peanut oil 0.1%. Amino acids like combination of 0.01%Methionine and 0.003% Cysteine was found effective, 0.1% Ammonium chloride supported maximum Prodigiosin production. Time required for maximum pigment production was also observed, it was found that 3 days time period required for maximum pigment production.
Data Mining has wide applications in numerous zones, for example, keeping money, prescription, in... more Data Mining has wide applications in numerous zones, for example, keeping money, prescription, investigative exploration and among government offices. Order is one of the ordinarily utilized assignments as a part of information mining applications. For as far back as decade, due to the ascent of different protection issues, numerous hypothetical and commonsense answers for the order issue have been proposed under diverse security models. Notwithstanding, with the late fame of distributed computing, clients now have the chance to outsource their information, in encoded structure, and also the information mining assignments to the cloud. Since the information on the cloud is in encoded structure, existing security protecting characterization methods are not appropriate. In this paper, system concentrates on fathoming the characterization issue over encoded information. Specifically, system proposes a classifier over scrambled information in the cloud. The index is created with the hel...
IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.5.0031 137 METHODOLOGY FOR HUMA... more IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.5.0031 137 METHODOLOGY FOR HUMAN SUSPICIOUS ACTIVITY DETECTION Tejashri Subhash Bora, Monika Dhananjay Rokade PG Student and Asst. Prof., Department of Computer Engg., SPCOE, Pune, India 2 boratej283@gmail.com, monikarokade04@gmail.com -----------------------------------------------------***-------------------------------------------------Abstract: The crime is increasing day by day. So for the security, the demands for surveillance cameras are also increased. Surveillance cameras are more and more being used in public places e.g. streets, intersections, banks, shopping malls, etc. However, the monitoring ability of law enforcement agencies has not kept pace. The outcome is that there is a deficiency in the utilization of surveillance cameras and an unworkable ratio of cameras to human monitors. One critical task in video surveillance is detecting anomalous events such as traffic accidents, crimes or illegal activitie...
3 ABSTRACT: Nowadays, data are stored to a third party in cloud environments and query processing... more 3 ABSTRACT: Nowadays, data are stored to a third party in cloud environments and query processing is also done by the third party to reduce the expense to maintain the system. Although there are lots of advantages in using independent third parties in query processing, security problems become more crucial since we cannot completely trust the third parties which can be easily corrupted or malfunctioning. The security problems with untrusted third parties are multifaceted in several areas such as privacy, authentication, and recovery. For privacy, the third party should not be able to know what the user's query is since the query itself describes the user's interest. For authentication, the user should be able to verify that the information from the third party is not tampered since the correctness of the query results depends upon the correctness of the information from the third party. For recovery, when the result is found to be forged by an adversary, we should be able to...
IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.4.0029 135 E-CERTIFICATE GENERA... more IMPACT FACTOR 6.228 WWW.IJASRET.COM DOI : 10.51319/2456-0774.2021.4.0029 135 E-CERTIFICATE GENERATION USING BLOCKCHAIN FOR P2P NETWORK: AN OVERVIEW Saber Nasir Take, Prof. Monika D. Rokade PG Student: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Dumbarwadi, Otur, India Assistant Prof.: Department of Computer Engineering, Sharadchandra Pawar College of Engineering, Dumbarwadi, Otur, India Sabertake@gmail.com , monikarokade4@gmail.com
1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department... more 1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department of Computer Engg., SPCOE, Maharashtra, India ---------------------------------------------------------------------***---------------------------------------------------------------------Abstract Fake news are described with an intenation to misdirect or to delude the reader. We have presented a response for the task for fake news, individuls are clashing if not by large poor locators of fake news. For this reason new system is generated for fake news identification. The result of this project determines the actual fake news detection for social networks using machine learning. Number of peoples having social media accounts such as facebook, whatsapp, twitter,etc. This social network is main source of news. Because of the wide effects of the huge fake news, individuals are clashing if not by large poor locators of fake news. While these sytems are utilized to make an increasingly dynamic...
1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department... more 1PG Student, Department of Computer Engg., SPCOE, Maharashtra, India 2Assistant Prof., Department of Computer Engg., SPCOE, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract Fake news are described with an intention to misdirect or to delude the reader. We have presented a response for the task for fake news, individuals are clashing if not by large poor locators of fake news. For this reason new system is generated for fake news identification. The result of this project determines the actual fake news detection for social networks using machine learning. Number of peoples having social media accounts such as facebook, whatsapp, twitter,etc. This social network is main source of news. Because of the wide effects of the huge fake news, individuals are clashing if not by large poor locators of fake news. While these systems are utilized to make an increasingly dynamic...
Uploads
Papers