Skip to main content
Information technologies have enabled the large corporations to increase the productivity and efficiency. Use of data, information has grown significantly over the last few years. These create new challenges in the world of information... more
Information technologies have enabled the large corporations to increase the productivity and efficiency. Use of data, information has grown significantly over the last few years. These create new challenges in the world of information processing. In this paper we try to address the information processing issues where data is originating from multiple sources in uncontrolled environment. The reason for uncontrolled environment is the data gathered beyond the organization and generated by many people working outside the organization. For example the survey reports submitted by many people or resumes submitted to particular position within an organization.
The intent of this paper is delving into this unformatted information and build the framework in such a way that the information becomes more managed and useful for the organization. Case and point for resume submitted for particular position, should become searchable. In this framework we try and solve the problem and provide suggestions on how to solve other similar problem. The important assumption here is that even though the data is unformatted, it still assumes that it contains some basic structure to it. For example, people will write their name and phone number in resume in some format. The completely random information is not that of interesting problem to solve because you wouldn’t know what that information is for any way. Completely structured information like student record is not also considered in this project, as there are already better solutions exists for such problems. The framework will provide the custom solutions of resume database problem and try to prove that for every such application one needs to design custom solutions.
For every communication system data security is the primary concern. Because of the unceasingly intense growth of internet and communication has made extensive use of images unavoidable. For the effective security of communication AES... more
For every communication system data security is the primary concern. Because of the unceasingly intense growth of internet and communication has made extensive use of images unavoidable. For the effective security of communication AES Algorithm for encryption and decryption has been introduced. It is based on AES Key Expansion where encryption process is bitwise exclusive or operation of a set of image pixels using 128 bit keys which changes for every pixels set. The Advanced Encryption Standard can be programmed both in software as well as in pure hardware. It is a most effective way of protecting sensitive information as it is stored on media or transmitted through the communication paths. I. INTRODUCTION There has been a need of secure transmission and storage of data to protect it from unauthorized access. Encryption is one of the common techniques to validate image security. Encryption of Images and Videos has a very wide application in various field which includes internet connection, Multimedia systems, the Industrial process, for transmitting medical images, Tele-Communication and military communication ,legal images that could contain a lot of confidential information. In the previous times Vector Quantization was used for the protection of images as an image encryption technique. In VQ image can be decomposed into vectors, which is then encoded and decoded vector by vector. Chaotic Algorithm was also used for the image cryptography. A chaotic map was created by symmetric block encryption Algorithm for permutation and diffusion of data. For encryption by using chaotic maps iteratively, multiple times is applied to the image. National Institute of Standard and Technology (NIST) defined the AES Algorithm.AES Algorithm makes uses of identical keys for the sender and receiver, for the encryption of message text and for the decryption of the cipher text. Over times many Algorithms have come from over the world for the Data Encryption but Rijandael Algorithm has been considered best for the purpose of security, Performance, Efficiency, implementing ability and flexibility. Rijndael has been defined as a block cipher that is developed by Joan Daemen and Vincent Rijmen. The algorithm is very smooth in supporting any combination of different datas and key size of 128, 192, and 256 bits. Though, AES hardly allows for a 128 bit data of length that could be divided into four most basic operation blocks. These blocks can operate on an array of bytes and can also be organized as a 4×4 matrix that is known as the state. For encrypting it fully, the data has to be passed through Nr rounds (Nr = 10, 12, 14) [4, 6].
The main trouble in wireless sensor network is node placement and coverage. It focused on the efficient deployment of sensor nodes within the networking region. The work mainly focused on the performance upgrading of sensor network. The... more
The main trouble in wireless sensor network is node placement and coverage. It focused on the efficient deployment of sensor nodes within the networking region. The work mainly focused on the performance upgrading of sensor network. The major objective of this work considered as using minimum number of relay nodes for better connectivity between the two areas. Relay nodes are the supportive nodes which set up the connectivity between the source and base station, in any cases the neighbor node is getting difficult over the connectivity on that time the relay node are take action and solve the problem and make the connectivity more perfect. The proposed work consists of three metrics there are, Rayleigh representation, SINR, Discover outage probability. This work mainly focused on improves the network lifetime and enhance better connectivity by placing the relay nodes (RN) and make a successful communication among two nodes.
WSN is a self organized network consisting of nodes. These nodes can have a small degree of movement due to medium on which they are deployed like body area networks where the sensors are fixed to body parts and the sensor exit movement... more
WSN is a self organized network consisting of nodes. These nodes can have a small degree of movement due to medium on which they are deployed like body area networks where the sensors are fixed to body parts and the sensor exit movement due to actions of body like walking, running, sleeping etc. Since the nodes are moving, it is very difficult to maintain a reliable connection and when congestion happens in this network. In this work we propose a congestion control protocol based on the prediction of movement pattern of nodes and the data flow rate at movement stage to decide the congestion control strategy.
This Paper emphasizes on uniqueness and specialty of medical data mining Healthcare related data mining is one of the most rewarding and challenging areas in application of data mining and knowledge discovery. The challenges are due to... more
This Paper emphasizes on uniqueness and specialty of medical data mining Healthcare related data mining is one of the most rewarding and challenging areas in application of data mining and knowledge discovery. The challenges are due to the data sets which are large, complex, heterogeneous, hierarchical, time series and of varying quality. The available healthcare datasets are fragmented and distributed in nature, thereby making the process of data integration a challenged task. The major issues related to tackle are ethical, legal and social aspects. Due to the lack of domain knowledge on the analyst's behalf it becomes necessary for an active collaboration between domain specialist and data miner with ethical and legal clearance from specialized hospitals. Medical datasets constitute a significant part of medical research. Ethical concerns, especially issues of confidentiality have resulted in the introduction of stringent regulations in doing this form of research. The merits and demerits of these new regulations are debated all over the world. The introduction of regulations for individual informed consent will prove costly to Indian physicians. Attempts are being made to evolve a consensus in which ethical concerns are given due respect without discouraging research.