i-manager's Journal on Information Technology (JIT)


Volume 5 Issue 4 September - November 2016

Research Paper

Secret Sharing Based Securing Online Banking Transactions

Kishor*
Professor, Department of Computer Engineering, G. H. Raisoni College of Engineering and Management, Pune, India.
Wagh. K. S (2016), “Secret Sharing Based Securing Online Banking Transactions”. i-manager’s Journal on Information Technology, 5(4), 1-4. https://doi.org/10.26634/jit.5.4.10331

Abstract

Nowadays, file sharing and communication is mostly dependent on internet. The proposed system is an application by which the user performs shopping using a shopping portal and pays the bill to the service provider through a banking server. All this is done using server and virtual nodes. The security is provided to bank information and personal information by active bundles. The identity management receives request from customer and then requests the server to generate the active key. This technique introduces new techniques of messaging, file transfer and exchange of media using secrets that will take the help of internet. By sharing range, the system can easily connect one smart-phone to another for messaging without using data plan that is provided by Internet Service Providers. The Proposed System lets us provide security to the data provided by client to the server application. The major advantage of proposed system is to transfer information with security.

Research Paper

Performance Evaluation of EA3ACK in different topology’s Using EAACK for MANET

K. Thamizhmaran*
Assistant Professor, Department of Electronics and Communication Engineering, Annamalai University, Annamalai Nagar, Tamilnadu, India.
Thamizhmaran. K (2016). Performance Evaluation of Proactive, Reactive and Hybrid Routing Protocols in different topology’s Using EAACK for MANET. i-manager’s Journal on Information Technology, 5(4), 5-10. https://doi.org/10.26634/jit.5.4.10332

Abstract

The recent emerging research Mobile Ad-hoc Networks (MANET) is a infrastructure-less network. All the nodes act as transmitter and receiver within their communication range and also act as medium. The main issues in MANET are to secure routing due to misbehaving attack preventing and having security from malicious nodes. In this recent research with the aim to filter misbehaviour attack, the author has proposed Intrusion Detection System (IDS), Enhanced Adaptive 3 Acknowledgement (EA3ACK) using EAACK (DSA) with (MARS4) hybrid cryptography for MANET. MARS4 which is a combination of RSA and MAJE4 is employed to reduce the routing congestion. Developed system that compares with five different scenarios through Network simulator (NS2) is used to implement and test the proposed system, providing secured transmission, and improving Packet Delivery Ratio (PDR) and throughput.

Research Paper

Public Transportation and Verification By Aadhar Card

Ashish Kumar Verma*
M. Tech. Scholar, Madan Mohan Malaviya University of Technology, Gorakhpur, Uttar Pradesh, India.
Verma. A. K (2016). Public Transportation and Verification By Aadhar Card. i-manager’s Journal on Information Technology, 5(4), 11-19. https://doi.org/10.26634/jit.5.4.10333

Abstract

In today's world, as we know that public transportation system such as airway, railway, roadway, and waterway are the network which is used for connecting different places of the world, these networks are not secure enough as there is no or improper verification of the passengers. Anyone can register a ticket in one of the respective transportation systems and can board in without any security check. Security issues are also a major issue as many passengers whether have a ticket or not, can enter in the roadway, train, water boat, and airport without going through any security check. For making our transportation system secure and to avoid losses of health & wealth of the people, verification through Aadhar Card Number is one of the best solutions. By using Aadhar card as a tool, security and verification of all passengers can be done very easily and efficiently. Ticket verification will be done at the respective station by going through biometric check which will confirm the details filled by passengers, while registering ticket and after verification from Aadhar database, passengers will get the confirmation message. This biometric check will be done at security check point so that all passengers have to go through security check.

Research Paper

An Efficient Smartcrawler for Harvesting Web Interfaces of a Two-Stage Crawler

Nikitha Sharma* , V. Sowmya Devi**
* M.Tech Scholar, Department of Computer Science and Engineering, Gitam University, Telangana, India.
** Assistant Professor, Department of Computer Science and Engineering, Gitam University, Telangana, India.
Sharma. N and Devi. V. S (2016). An Efficient Smart Crawler for Harvesting Web Interfaces of Two-Stage Crawler. i-manager's Journal on Information Technology, 5(4), 20-25. https://doi.org/10.26634/jit.5.4.10334

Abstract

The WWW is an incomprehensible collection of one thousand millions of pages containing tera bytes of information organized in many servers using HTML. The extent of this gathering itself is an imposing snag in recovering fundamental and applicable data. This made web indexes a vital part of our service. The venture expects to make a keen WebCrawler for an idea based semantic based internet searcher. The authors intend to raise the potency of the Concept Based Semantic Search Motor by utilizing the SmartCrawler. They proposed a two phase architecture to be specific SmartCrawler, for smartly collecting incredible web interfaces. On the premier level, SmartCrawler performs site-based crawling for hunting down key pages with the brace of web search tools, abstaining from going by a prodigious amount of pages. To finish more correct answers for a drew in crawl, SmartCrawler position locales to sort out significantly corresponded ones for a devoted topic. In the secondary level, SmartCrawler finishes quick on-site looking by uncovering most relevant associations with associate in nursing versatile association situations. To evacuate incomplete destinations on setting off to some particularly applicable associations in releasing web registries, we plot an association tree data structure to reach a broader degree for a website. The outcomes occur on a game plan of those ranges, which show the adaptability and precision of the proposed crawler structure, which competently recoups significant web interfaces from sizable voluminous-scale neighborhoods and finishes higher rates than other crawler's results.

Research Paper

Curve Approach to hide Image based Information in a Digital Cover

Ruchi Kawatra* , Vinay Kumar**, Sushila Madan***
* Assistant Professor, Department of IT, Institute of Information Technology & Management (IITM), Janakipur, India.
** Dean, Vivekananda Institute of Professional Studies (affiliated to GGSIPU), Delhi, India.
*** Sushila Madan, Associate Professor, Department of Computer Science, Lady Shri Ram College, Delhi University, India.
Kawatra. R, Kumar. V and Madan. S (2016). Curve Approach to hide Image based Information in a Digital Cover. i-manager’s Journal on Information Technology, 5(4), 26-32. https://doi.org/10.26634/jit.5.4.10335

Abstract

Information or data is a very important resource. It becomes very essential to secure it. The communication channel through which we transmit our data does not provide data security and privacy. Hiding message using information hiding techniques play a vital role. Steganography is one of the methods of secret communication that usually hides the existence of hidden message. It can be defined as the study of invisible communication that usually deals with the ways of hiding the existence of the communicated message. The hidden message may be text, image, audio, and video. In this paper, the authors have selected a JPEG image as cover. A two dimensional elliptic curve is taken as the stego key to find location in the digital image and a secret message is embedded in it. The approach is to hide the message in such a way that no suspicion is raised.

Review Paper

Comparative Review Of Artificial Neural Network Machine Learning For Diagnosing Anemia in Pregnant Ladies

Neha Sharma* , Vikas Khullar**
* PG Scholar, Department of Computer Science and Engineering, CT Institute of Engineering Management and Technology, Punjab, India.
** Assistant Professor, Department of Computer Science and Engineering, CT Institute of Engineering Management and Technology, Punjab, India.
Sharma. N and Khullar. V (2016). Comparative Review Of Artificial Neural Network Machine Learning For Diagnosing Aneamia Deficiency in Pregnant Ladies. i-manager's Journal on Information Technology, 5(4), 33-38. https://doi.org/10.26634/jit.5.4.10337

Abstract

Nowadays, it becomes more elusive for doctors to deal with diseases due to lack of proper specialists. Surveys conducted by reputed institutions revealed that Anemia is the most occurring deficiency in pregnant females. With the advancements in artificial computing, the machines are putting best efforts for diagnosing various diseases. The major objective of this paper is the comparative analysis of Artificial Neural Network and fuzzy expert system for the better efficiency in diagnosing anemic patients. Finally, on the basis of reviewed researches, the authors have concluded the best technique for diagnosing anemic patients [6, 16, 23].