Mobile health (mHealth) monitoring using Cloud, applies the common mobile communications and clou... more Mobile health (mHealth) monitoring using Cloud, applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a new approach to improve the quality of healthcare service while l...
International Journal of Computer Sciences and Engineering, 2017
For increase rate of fault detection test case prioritization is needed, which shows how fast bug... more For increase rate of fault detection test case prioritization is needed, which shows how fast bugs are identified during the testing phase. In test case prioritization follow way to use the information of previously executed test cases, such as coverage information, resulting in an iterative prioritization algorithm. Real fact of using coverage information can improve the rate of fault detection in prioritization algorithms. But performance of such iterative prioritization schemes degrade as the number of ties occurred in prioritization steps increases. In test case prioritization using lexicographical ordering and extended diagraph, we propose a new heuristic for breaking ties in coverage based techniques. Performance of the proposed technique in terms of the rate of fault detection is comparatively evaluated using a wide range of programs. Results indicate that the proposed technique can resolve ties and in turn noticeably increases the rate of fault detection.
The most common use of certificate is in websites to provide secure communication. As CA is respo... more The most common use of certificate is in websites to provide secure communication. As CA is responsible for issue, revocation and reissue of certificate, the certificate management task gains a lot of importance. There are many issues in certificate management such as revocation in case the certificate got compromised before expiry, handling anonymous digital certificates, fast revocation and reissue of certificate and much more. The most common way of managing certificate revocation is use of Certificate Revocation List (CRL). However, due to above issues, the revocation of certificate cannot be completely automated. Again we have to consider burden on CA for certificate management. Another approach to handle the overhead of certificate management on CA is to distribute the part of CA responsibilities (such as reissue and revocation) to user, in controllable manner so that the basic rights of CA (such as issue of certificate) remain untouched. In this paper we explore various techn...
2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017
Modern lifestyle requires an individual to do a plethora of tasks with utmost efficiency for long... more Modern lifestyle requires an individual to do a plethora of tasks with utmost efficiency for longer periods of time. This becomes increasingly difficult to achieve due to a number of distractions available in today's environment. Our brains contain different brainwaves which influence our behavior. These brainwaves can be manipulated to encourage certain kinds of behavior. The objective of this paper is to provide a method of manipulating these brainwaves to achieve a greater degree of focus and relaxation for longer periods of time. The method proposed in this paper makes use of a phenomenon called Binaural beats. Binaural beats happen when two different frequencies which are sinusoidal in nature are introduced to the two ears. The ‘beat’ effect of binaural beats is caused due to the difference between the two frequencies presented to each ear. Usually the difference between these frequencies is relatively small. This difference in the frequencies presented to each of the ear is actually the frequency of the Binaural beats. The method proposed in this paper combines short bursts and continuous stimulus of binaural beats to increase focus and relaxation among the users by reducing habituation.
International Journal of Advance Research and Innovative Ideas in Education, 2017
In this technique, we are trying to connect the household electrical appliances using Raspberry P... more In this technique, we are trying to connect the household electrical appliances using Raspberry Pi 2 and an Android Smartphone. This is basically an application of Internet of things (IoT). Home Automation is the demand of the current generation and this is the future too. We will use an Android Application which will control the devices in the house. The Raspberry pi 2 will be connected to the devices and take the order from the users and manipulate or make changes accordingly. The product the reasonable and too easy to operate and will really prove to be a great product in market.
Abstract: Botnets, regarded as the worms with fundamental command and control (C&C) channel, are ... more Abstract: Botnets, regarded as the worms with fundamental command and control (C&C) channel, are becoming the typically frustrating threats to the Internet infrastructure. In order to defeat the botnets effectively, we should not only focus on known botnets, but also need to conduct some researches on the potential advanced botnets that could be developed by the adversary in the future. By investigating the vital C&C mechanism deeply, we present an advanced social peer-to-peer (ASP2P) botnet practically that combines the advantages of social networks and hybrid P2P structure in the way that bots receive encrypted commands from the social networks via HTTP and the C&C topology is hybrid peer-to-peer structure. ASP2P botnet is feasible and showed to be more covert and robust that it can be hardly detected and shut down compared with other P2P botnets.
Abstract: Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile... more Abstract: Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a revolutionary approach to improve the quality of healthcare service while lowering the healthcare cost. Well, unfortunately it also poses a serious risk on clients / mobile users privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. This project is to address privacy as an important problem and design Mobile Health Monitoring with Privacy Preserving using Cloud to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly- proposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients privacy and service providers intellectual property. Finally, ou...
International Journal of Innovative Technology and Exploring Engineering, 2019
Nowadays, crypto currency has become a trending theme within the software package globe. Crypto c... more Nowadays, crypto currency has become a trending theme within the software package globe. Crypto currency may be a digital quality that’s meant to operate as a dealings medium that utilizes sturdy cryptography to secure asset exchange and make sure plus transfer. Crypto currency is in addition spoken as digital suburbanised cash. Block chain stores knowledge concerning dealings which will be accustomed assess transaction trait. This voting system deals with multi chain block chain technology. We can define block chain as a digital transaction which is used to record financial transactions also as totally different transactions. As a result of the knowledge keep within the block chain isn’t related to personal identifiable information, it’s such a fanonymity attribute. Blockchain allows dealings and verification to be clear. The options of this block chain technology are useful in powerful voting system,robustness, obscurity and transparency. The electoral system is our country’s core...
Cloud computing security is now becoming one of the main concerns preventing the adoption of the ... more Cloud computing security is now becoming one of the main concerns preventing the adoption of the cloud by many organizations. This paper surveys the attacks done on cloud and their mitigation strategies to defend the cloud specific CIDoS class of attacks (Cloud-Internal Denial of Service). The alleviation approaches are based on techniques used in signals processing field. The main strategy to detect the attack is the calculation of correlations measurement and distances between attackers workload patters; we use DCT (Discrete Cosine Transform) to accomplish this task. This paper also suggests some prevention and response strategies.
Anomaly detection is a method of identifying an abnormal activity through the live video sequence... more Anomaly detection is a method of identifying an abnormal activity through the live video sequence. Our proposed system uses Autoencoders for detecting anomaly activities. Nowadays there is a need for video anomaly detecting systems to prevent crimes and bad thigs from happening. In this paper we provide a system that detects the anomalous events by implementing the ConvLSTM auto encoder which gives the results depending on the type of the events. We achieve an accuracy of 74% on avenue dataset.
Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communica... more Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a revolutionary approach to improve the quality of healthcare service while lowering the healthcare cost. Well, unfortunately it also poses a serious risk on clients/ mobile users privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. This project is to address privacy as an important problem and design Mobile Health Monitoring with Privacy Preserving using Cloud to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newlyproposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients privacy and service providers intellectual property. Finally, our security an...
Mobile health (mHealth) monitoring using Cloud, applies the common mobile communications and clou... more Mobile health (mHealth) monitoring using Cloud, applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a new approach to improve the quality of healthcare service while l...
International Journal of Computer Sciences and Engineering, 2017
For increase rate of fault detection test case prioritization is needed, which shows how fast bug... more For increase rate of fault detection test case prioritization is needed, which shows how fast bugs are identified during the testing phase. In test case prioritization follow way to use the information of previously executed test cases, such as coverage information, resulting in an iterative prioritization algorithm. Real fact of using coverage information can improve the rate of fault detection in prioritization algorithms. But performance of such iterative prioritization schemes degrade as the number of ties occurred in prioritization steps increases. In test case prioritization using lexicographical ordering and extended diagraph, we propose a new heuristic for breaking ties in coverage based techniques. Performance of the proposed technique in terms of the rate of fault detection is comparatively evaluated using a wide range of programs. Results indicate that the proposed technique can resolve ties and in turn noticeably increases the rate of fault detection.
The most common use of certificate is in websites to provide secure communication. As CA is respo... more The most common use of certificate is in websites to provide secure communication. As CA is responsible for issue, revocation and reissue of certificate, the certificate management task gains a lot of importance. There are many issues in certificate management such as revocation in case the certificate got compromised before expiry, handling anonymous digital certificates, fast revocation and reissue of certificate and much more. The most common way of managing certificate revocation is use of Certificate Revocation List (CRL). However, due to above issues, the revocation of certificate cannot be completely automated. Again we have to consider burden on CA for certificate management. Another approach to handle the overhead of certificate management on CA is to distribute the part of CA responsibilities (such as reissue and revocation) to user, in controllable manner so that the basic rights of CA (such as issue of certificate) remain untouched. In this paper we explore various techn...
2017 International Conference on Emerging Trends & Innovation in ICT (ICEI), 2017
Modern lifestyle requires an individual to do a plethora of tasks with utmost efficiency for long... more Modern lifestyle requires an individual to do a plethora of tasks with utmost efficiency for longer periods of time. This becomes increasingly difficult to achieve due to a number of distractions available in today's environment. Our brains contain different brainwaves which influence our behavior. These brainwaves can be manipulated to encourage certain kinds of behavior. The objective of this paper is to provide a method of manipulating these brainwaves to achieve a greater degree of focus and relaxation for longer periods of time. The method proposed in this paper makes use of a phenomenon called Binaural beats. Binaural beats happen when two different frequencies which are sinusoidal in nature are introduced to the two ears. The ‘beat’ effect of binaural beats is caused due to the difference between the two frequencies presented to each ear. Usually the difference between these frequencies is relatively small. This difference in the frequencies presented to each of the ear is actually the frequency of the Binaural beats. The method proposed in this paper combines short bursts and continuous stimulus of binaural beats to increase focus and relaxation among the users by reducing habituation.
International Journal of Advance Research and Innovative Ideas in Education, 2017
In this technique, we are trying to connect the household electrical appliances using Raspberry P... more In this technique, we are trying to connect the household electrical appliances using Raspberry Pi 2 and an Android Smartphone. This is basically an application of Internet of things (IoT). Home Automation is the demand of the current generation and this is the future too. We will use an Android Application which will control the devices in the house. The Raspberry pi 2 will be connected to the devices and take the order from the users and manipulate or make changes accordingly. The product the reasonable and too easy to operate and will really prove to be a great product in market.
Abstract: Botnets, regarded as the worms with fundamental command and control (C&C) channel, are ... more Abstract: Botnets, regarded as the worms with fundamental command and control (C&C) channel, are becoming the typically frustrating threats to the Internet infrastructure. In order to defeat the botnets effectively, we should not only focus on known botnets, but also need to conduct some researches on the potential advanced botnets that could be developed by the adversary in the future. By investigating the vital C&C mechanism deeply, we present an advanced social peer-to-peer (ASP2P) botnet practically that combines the advantages of social networks and hybrid P2P structure in the way that bots receive encrypted commands from the social networks via HTTP and the C&C topology is hybrid peer-to-peer structure. ASP2P botnet is feasible and showed to be more covert and robust that it can be hardly detected and shut down compared with other P2P botnets.
Abstract: Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile... more Abstract: Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a revolutionary approach to improve the quality of healthcare service while lowering the healthcare cost. Well, unfortunately it also poses a serious risk on clients / mobile users privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. This project is to address privacy as an important problem and design Mobile Health Monitoring with Privacy Preserving using Cloud to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newly- proposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients privacy and service providers intellectual property. Finally, ou...
International Journal of Innovative Technology and Exploring Engineering, 2019
Nowadays, crypto currency has become a trending theme within the software package globe. Crypto c... more Nowadays, crypto currency has become a trending theme within the software package globe. Crypto currency may be a digital quality that’s meant to operate as a dealings medium that utilizes sturdy cryptography to secure asset exchange and make sure plus transfer. Crypto currency is in addition spoken as digital suburbanised cash. Block chain stores knowledge concerning dealings which will be accustomed assess transaction trait. This voting system deals with multi chain block chain technology. We can define block chain as a digital transaction which is used to record financial transactions also as totally different transactions. As a result of the knowledge keep within the block chain isn’t related to personal identifiable information, it’s such a fanonymity attribute. Blockchain allows dealings and verification to be clear. The options of this block chain technology are useful in powerful voting system,robustness, obscurity and transparency. The electoral system is our country’s core...
Cloud computing security is now becoming one of the main concerns preventing the adoption of the ... more Cloud computing security is now becoming one of the main concerns preventing the adoption of the cloud by many organizations. This paper surveys the attacks done on cloud and their mitigation strategies to defend the cloud specific CIDoS class of attacks (Cloud-Internal Denial of Service). The alleviation approaches are based on techniques used in signals processing field. The main strategy to detect the attack is the calculation of correlations measurement and distances between attackers workload patters; we use DCT (Discrete Cosine Transform) to accomplish this task. This paper also suggests some prevention and response strategies.
Anomaly detection is a method of identifying an abnormal activity through the live video sequence... more Anomaly detection is a method of identifying an abnormal activity through the live video sequence. Our proposed system uses Autoencoders for detecting anomaly activities. Nowadays there is a need for video anomaly detecting systems to prevent crimes and bad thigs from happening. In this paper we provide a system that detects the anomalous events by implementing the ConvLSTM auto encoder which gives the results depending on the type of the events. We achieve an accuracy of 74% on avenue dataset.
Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communica... more Mobile health (mHealth) monitoring using Cloud as SAAS, which applies the common mobile communications and cloud computing technologies to provide feedback decision support, which has been considered as a revolutionary approach to improve the quality of healthcare service while lowering the healthcare cost. Well, unfortunately it also poses a serious risk on clients/ mobile users privacy and intellectual property of monitoring service providers, which could prevent the wide adoption of mHealth technology. This project is to address privacy as an important problem and design Mobile Health Monitoring with Privacy Preserving using Cloud to protect the privacy of the involved parties and their data. Moreover, the outsourcing decryption technique and a newlyproposed key private proxy re-encryption are adapted to shift the computational complexity of the involved parties to the cloud without compromising clients privacy and service providers intellectual property. Finally, our security an...
Uploads
Papers by Vina Lomte