An Idea To Design A Trapping System To Enhance Security

Umesh Kumar Pandey*, Snehlata Barde**
*Assistant Professor (Contract Based), Department Of Computer Science, Rajeev Gandhi Govt. Post-Graduate Autonomous College, Ambikapur, Chhattisgarh, India.
**Associate Professor, MATS University, Raipur, Chhattisgarh, India.
Periodicity:March - May'2018
DOI : https://doi.org/10.26634/jpr.5.1.14793

Abstract

In today’s world, it is known that, it is a big problem to search for a person who is lost, who has stolen any items from us, who is accused of any crime or who performs any unauthorized work in an organization. Sometimes, we also know about this person, but we are unable to find the current or past working details, acting, or moving status of this accused person; how will we find that person, secure society and aware a specific area of people from human crimes is a big challenge of the security system. For this, an effort has been made to design an online trapping system based on web enable application to solve the above problems. Data were gathered from people who wants to complain online, control all services, and trap the criminal. This system provides the facility to trap a person who is accused in any crime and moving anywhere.

Keywords

Aadhar, Security System, Trapping System, Service Provider

How to Cite this Article?

Pandey, U.K., and Barde, S. (2018).An Idea To Design A Trapping System To Enhance Security . i-manager’s Journal on Pattern Recognition, 5(1), 10-14. https://doi.org/10.26634/jpr.5.1.14793

References

[1]. El-Hadary, H., & El-Kassas, S. (2014). Capturing security requirements for software systems. Journal of Advanced Research, 5(4), 463-472.
[2]. Elmaghraby, A. S., & Losavio, M. M. (2014). Cyber security challenges in Smart Cities: Safety, security and privacy. Journal of Advanced Research, 5(4), 491-497.
[3]. Gronau, N. (2016). Determinants of an appropriate degree of autonomy in a cyber-physical production system. Procedia CIRP, 52, 1-5.
[4]. Gualdoni, J., Kurtz, A., Myzyri, I., Wheeler, M., & Rizvi, S. (2017). Secure Online Transaction Algorithm: Securing Online Transaction using Two-Factor Authentication. Procedia Computer Science, 114, 93-99.
[5]. Gupta, G. P., & Kulariya, M. (2016). A framework for fast and efficient cyber security network intrusion detection using Apache Spark. Procedia Computer Science, 93, 824-831.
[6]. Ijaz, S., Shah, M. A., Khan, A., & Ahmed, M. (2016). Smart cities: A survey on security concerns. International Journal of Advanced Computer Science and Applications, 7(2), 612-625.
[7]. Ilie-Zudor, E., Kemény, Z., & Preuveneers, D. (2016). Efficiency and security of process transparency in production networks-a view of expectations, obstacles and potentials. Procedia CIRP, 52, 84-89.
[8]. Kristian, Y., Armanto, H., & Frans, M. (2012). Utilizing GPS and SMS for Tracking and Security Lock Application on Android based Phone. Procedia-Social and Behavioral Sciences, 57, 299-305.
[9]. Lacinák, M., & Jozef, R. (2017). Smart city, Safety and Security. International Scientific Conference on Sustainable, Modern and Safe Transport, Procedia Engineering, 192 (2017), 522-527.
[10]. Lovati, V., Palmieri, G., Gervasini, S., & Colombo, A. M. (2012). An ID-Card based security system for railway applications. Procedia-Social and Behavioral Sciences, 48, 234-245.
[11]. Zhu, J., Xie, J., Lipford, H. R., & Chu, B. (2014). Supporting secure programming in web applications through interactive static analysis. Journal of Advanced Research, 5(4), 449-462.
If you have access to this article please login to view the article or kindly login to purchase the article

Purchase Instant Access

Single Article

North Americas,UK,
Middle East,Europe
India Rest of world
USD EUR INR USD-ROW
Pdf 35 35 200 20
Online 35 35 200 15
Pdf & Online 35 35 400 25

Options for accessing this content:
  • If you would like institutional access to this content, please recommend the title to your librarian.
    Library Recommendation Form
  • If you already have i-manager's user account: Login above and proceed to purchase the article.
  • New Users: Please register, then proceed to purchase the article.