@article{noauthororeditor, abstract = {Employees are the most valuable resource in any organization. It is the main cause of the success of a business. The evaluation of employee performance is a very important task as it shows how the employees skills are improving. The HR department is responsible for this task. The employee performance evaluation is complex and time consuming. In the last decade, information technology tools have undergone a huge evolution and can help with this complex task. Artificial Intelligence AI is a recent science that consists of building systems that imitate human behavior. It is widely used in many applications like healthcare, banking, and finance. This thesis focuses on studying the impact of artificial intelligence on the employee evaluation process. An analytical descriptive methodology was used. Intelligence is considered an independent variable. However, employee performance evaluation is the dependent variable DV . Four dimensions of the DV were considered objectives and key results, skills gap analysis, tracking training completion, and project or task management tools. A questionnaire of 34 items was built and distributed to the IT employees of the Babylon Education Directorate. 295 answers were collected. SPSS software was used to examine the answers. The MANOVA test was applied to validate the study hypotheses. The result shows that AI has a significant positive impact on the evaluation of employees performance in all dimensions. Ali Al Imari | Saeed Abdallah "The Role of Artificial Intelligence Applications in Managing the Employee Performance Evaluation: An Iraqi Case Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-7 | Issue-3 , June 2023, URL: https://www.ijtsrd.com.com/papers/ijtsrd57454.pdf Paper URL: https://www.ijtsrd.com.com/computer-science/other/57454/the-role-of-artificial-intelligence-applications-in-managing-the-employee-performance-evaluation-an-iraqi-case-study/ali-al-imari }, added-at = {2023-07-17T12:46:48.000+0200}, author = {Abdallah, Ali Al Imari | Saeed}, biburl = {https://www.bibsonomy.org/bibtex/286bc65cb095543d580a8cd88110e2f1a/ijtsrd}, interhash = {ad4753b8897aa35d0d43785ea6e21063}, intrahash = {86bc65cb095543d580a8cd88110e2f1a}, issn = {2456-6470}, journal = {INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT}, keywords = {Artificialintelligence MANOVA, analysis, and completion, employee gap intelligence, key management objectives or performance, project results, skills task tools tracking training}, language = {english}, month = {June}, number = 3, pages = {711-721}, timestamp = {2023-07-17T12:46:48.000+0200}, title = {The Role of Artificial Intelligence Applications in Managing the Employee Performance Evaluation An Iraqi Case Study }, url = {https://www.ijtsrd.com.com/computer-science/other/57454/the-role-of-artificial-intelligence-applications-in-managing-the-employee-performance-evaluation-an-iraqi-case-study/ali-al-imari}, volume = 7, year = 2023 } @article{noauthororeditor, abstract = {To obtain information from two sources we need minutiae positions from one source the orientation from one source and the reference points from both sources. A combined minutiae template is created with the use of obtained information. In the field of remote data management services cloud storage has emerged as a major sector. It raises security issues because encryption is currently the greatest method for avoiding data leakage. A promising method among these is public key encryption with keyword search PKSE which allows users to quickly search through encrypted data files. The client first generates a search token when to query data files The cloud server uses the search token to proceed the query over encrypted data files. However a serious attack is raised when PKSE meets cloud. The problem is Cloud Server discover the privacy information. In our proposed system propose a forward secure Attribute based Elliptic Curve Digital Signature searchable encryption scheme. Finally our experiments show our scheme is efficient. Eben Paul Richard | Aravind Swaminathan "Attribute Based Ecdsa Searchable Encryption in Cloud Computing (ECDSA - Elliptic Curve Digital Signature Algorithm)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd) ISSN: 2456-6470 Volume-7 | Issue-2 April 2023 URL: https://www.ijtsrd.com.com/papers/ijtsrd55045.pdf Paper URL: https://www.ijtsrd.com.com/computer-science/other/55045/attribute-based-ecdsa-searchable-encryption-in-cloud-computing-ecdsa--elliptic-curve-digital-signature-algorithm/eben-paul-richard }, added-at = {2023-07-11T12:16:05.000+0200}, author = {Swaminathan, Eben Paul Richard | Aravind}, biburl = {https://www.bibsonomy.org/bibtex/25b953b9798cf1a0ed660ff81bf4ce953/ijtsrd}, interhash = {83a08e1ac1f8862ca698a44761491716}, intrahash = {5b953b9798cf1a0ed660ff81bf4ce953}, issn = {2456-6470}, journal = {INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT}, keywords = {(ECDSA) (PKSE) Curve Digital Elliptic Encryption Signature encryption key keyword public search searchable token with}, language = {english}, month = apr, number = 2, pages = {551-556}, timestamp = {2023-07-11T12:16:05.000+0200}, title = {Attribute Based Ecdsa Searchable Encryption in Cloud Computing ECDSA Elliptic Curve Digital Signature Algorithm }, url = {https://www.ijtsrd.com.com/computer-science/other/55045/attribute-based-ecdsa-searchable-encryption-in-cloud-computing-ecdsa--elliptic-curve-digital-signature-algorithm/eben-paul-richard}, volume = 7, year = 2023 } @article{noauthororeditor, abstract = {In the last decades, data information security has become an issue of great concern to data information analyst users . To enhance the efficiency and reliability of data information , such data information must be encoded before been used, send or saved for future use as the case maybe. However, such encoded data information need to be decoded before it’s efficiency and reliability can be ascertained whenever in use. It is against this background therefore that this study on the analysis of decoding plaintext data using enhanced hamming code techniques. Afolabi Godfrey | Abba Almu | Dogondaji. A. M. "Analysis of Decoding Plaintext Data: Using Enhanced Hamming Code Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47918.pdf Paper URL: https://www.ijtsrd.com/mathemetics/other/47918/analysis-of-decoding-plaintext-data-using-enhanced-hamming-code-techniques/afolabi-godfrey }, added-at = {2022-07-18T08:01:27.000+0200}, author = {M., Afolabi Godfrey | Abba Almu | Dogondaji. A.}, biburl = {https://www.bibsonomy.org/bibtex/2cea239f6904f377868b72050e71dc11a/ijtsrd}, interhash = {97cdff16c39789515f103db287b577dd}, intrahash = {cea239f6904f377868b72050e71dc11a}, issn = {2456-6470}, journal = {INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT}, keywords = {ASCII Data Decode Decoded Letter Parity Plaintext and code key}, language = {English}, month = {December }, number = 1, pages = {912-914}, timestamp = {2022-07-18T08:01:27.000+0200}, title = {Analysis of Decoding Plaintext Data Using Enhanced Hamming Code Techniques }, url = {https://www.ijtsrd.com/mathemetics/other/47918/analysis-of-decoding-plaintext-data-using-enhanced-hamming-code-techniques/afolabi-godfrey}, volume = 6, year = 2021 } @article{noauthororeditor, abstract = {According to the Bangladesh Bureau of Statistics BBS , the literacy rate in Bangladesh is increasing day by day. But, Its not acceptable to our present day. The role model of an education system is a teacher or instructor. Proper education can improve our literacy rate and also be a huge change for our future Digital Bangladesh. This enhancement is only possible to highly trained instructors or teachers. In order to improve an organizations training process, it’s important to assess how instructors are trained their students. This research has worked on identifying the key factors of training Technical School and College teachers in Bangladesh. The proposed work is conducted by Data Mining and Machine Learning. The methods of this experiment are Data Processing, Data Mining, and Analysis and Evaluation. Filtering our data is completed by using the Data Processing method. After that, the datasets are trained and tested by the Data Mining and Machine Learning tools. Finally, the experimental results are evaluated and analyzed by the different assessment tools. The accuracy of our trained models are 0.97 , 0.97 , 0.96 , 0.96 , 0.96 , 0.96 , 0.94 , 0.93 , 0.93 , 0.92 , 0.91 , 0.33 , 0.22 using the Logistic Regression, Extra Trees Classifier, Random Forest Classifier, Gradient Boosting Classifier, Light Gradient Boosting Machine, SVM Linear Kernel, Ada Boost Classifier, K Neighbors Classifier, Linear Discriminant Analysis, Decision Tree Classifier, Ridge Classifier, Quadratic Discriminant Analysis, Naive Bayes, respectively. As a result, the Logistic Regression does accurately identify and classify the key factors of training Technical School and College teachers. The Logistic Regression model accuracy is 0.97 which gives better accuracy than other machine learning algorithms. Md. Mehedi Hasan | Md. Imran Ali | Nakib Aman Turzo | Golam Rabbani "Identifying the Key Factors of Training Technical School and College Teachers in Bangladesh Using Data Mining" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-1 , December 2021, URL: https://www.ijtsrd.com/papers/ijtsrd47901.pdf Paper URL: https://www.ijtsrd.com/computer-science/data-miining/47901/identifying-the-key-factors-of-training-technical-school-and-college-teachers-in-bangladesh-using-data-mining/md-mehedi-hasan }, added-at = {2022-07-18T07:46:11.000+0200}, author = {Rabbani, Md. Mehedi Hasan | Md. Imran Ali | Nakib Aman Turzo | Golam}, biburl = {https://www.bibsonomy.org/bibtex/28e47cf0a862138448e5e7ee53e661e1b/ijtsrd}, interhash = {76ed7322e3ab14a857e7f0263ccaf84c}, intrahash = {8e47cf0a862138448e5e7ee53e661e1b}, issn = {2456-6470}, journal = {INTERNATIONAL JOURNAL OF TREND IN SCIENTIFIC RESEARCH AND DEVELOPMENT}, keywords = {& Analysis Bangladesh Bayes Bureau Classifier College Data Decision Discriminant Evaluation Extra Forest Instructors K Key Learning Linear Logistic Machine Mining Naive Neighbors Processing Random Regression School Statistics Teachers Technical Tree Trees factors of}, language = {English}, month = {December }, number = 1, pages = {864-869}, timestamp = {2022-07-18T07:46:11.000+0200}, title = {Identifying the Key Factors of Training Technical School and College Teachers in Bangladesh Using Data Mining }, url = {https://www.ijtsrd.com/computer-science/data-miining/47901/identifying-the-key-factors-of-training-technical-school-and-college-teachers-in-bangladesh-using-data-mining/md-mehedi-hasan}, volume = 6, year = 2021 } @article{noauthororeditor, abstract = {CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni }, added-at = {2021-07-14T08:44:13.000+0200}, author = {JVN, Dinesh Soni | Dr. Lakshmi}, biburl = {https://www.bibsonomy.org/bibtex/265165b390fa74b8122b0595180b03140/ijtsrd}, interhash = {ff5aa33456b8618e2c44aeaa6af96c2e}, intrahash = {65165b390fa74b8122b0595180b03140}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Access CBPHR Controls Encryption File Key Trapdoor}, language = {english}, month = jun, number = 4, pages = {292-294}, timestamp = {2021-07-14T08:44:13.000+0200}, title = {Personal Health Record over Encrypted Data Using Cloud Service }, url = {https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni}, volume = 5, year = 2021 } @article{noauthororeditor, abstract = {Electronic Passport is one of the results of the electronic revolution in The World since the passport is the document of the person in terms of identity and nationality and is the property of the country. One of the most important Challenges is to protect this document from forgery. The common forgery for the Passport is replacing its holder photo. The proposed system concentrates on the Security part of the e passport. It consists of two parts the first part is hiding of the security code by using steganography and storing the same code in the issuing Country of the e passport. The other part will be operated at the control point of the destination country to make sure of the e passport validity by checking the Hidden code using NFC and verify it with the one. If the two values are equal, then the system will compute a key using Diffie Hellman Key Exchange. This Key will be used to read the secret information. The project designed is an Authentication system where the Passport holder is authorized through Technology. Electronic passports include contactless chip which stores personal Data of the passport holder, information about the passport and the issuing Institution. In its simplest form an electronic passport contains just a collection of Read only files, more advanced variants can include sophisticated cryptographic Mechanisms protecting security of the document and or privacy of the passport Holder. Dr. R. Mohana Priya | V. Bharanitharan | S. Clementinbaraj | R. Kirubaharan "Security Enhancement and Eminent Verification Measures of Global Distinctive E-Passport" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd41101.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/41101/security-enhancement-and-eminent-verification-measures-of-global-distinctive-epassport/dr-r-mohana-priya }, added-at = {2021-06-08T13:07:05.000+0200}, author = {Kirubaharan, Dr. R. Mohana Priya | V. Bharanitharan | S. Clementinbaraj | R.}, biburl = {https://www.bibsonomy.org/bibtex/2ecc112e6f7242abfc04903b3e4b7c1ae/ijtsrd}, interhash = {d9e42c1735eca260502b8f76cc9231e2}, intrahash = {ecc112e6f7242abfc04903b3e4b7c1ae}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {-International -Programmable -Radio -Unique -Ventilator -Visa ASP- Access Application Associated Aviation BAC- Basic Civil Control Controller Crystal Display Frequency IACCO Identification Information Key LCD- Liquid Logic Number Organization PKI- PLC Pneumonia Program Provider Public RFID Service UID VAL VAW Waiver}, language = {English}, month = {April}, number = 3, pages = {1017-1021}, timestamp = {2021-06-08T13:07:05.000+0200}, title = {Security Enhancement and Eminent Verification Measures of Global Distinctive E Passport }, url = {https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/41101/security-enhancement-and-eminent-verification-measures-of-global-distinctive-epassport/dr-r-mohana-priya}, volume = 5, year = 2021 } @article{noauthororeditor, abstract = {While Vedas glorify the nature of Atma and its ways for realization it is said to be somewhat personal. Attaining liberation from the cycle of births and deaths may be the fixed goal of a few specific souls. Vedas are not easily accessible to all due to its having a tough and terse style and dealing with super natural aspects. But puranas are simple in their style and readable to all. They are easily understandable as they are in easy Anushtup metre. They concentrate on making the theme understandable to all by their stories and narrative styles.Without making this world a better place, by pleasing all around us, in all possible ways, one cannot simply think of reaching heaven or liberation. Social services are the basic duties of every human being. By the passing over of time and leisured life style of today, men are being trapped in luxuries. Rather than living for one self, they try to show case their status in the society. The mankind forgets the goal of the world welfare. Vedas and puranas make it more clear to follow the path of social service as a binding duty of the human being. Dr. N. Venkatesha Rao "Social Service in Puranas" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-2 , February 2021, URL: https://www.ijtsrd.com/papers/ijtsrd38347.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/sanskrit/38347/social-service-in-puranas/dr-n-venkatesha-rao }, added-at = {2021-04-13T11:15:45.000+0200}, author = {Rao, Dr. N. Venkatesha}, biburl = {https://www.bibsonomy.org/bibtex/27a6d06d5da3423c6c21fe8f809c0e6bd/ijtsrd}, interhash = {b542b2098cd3cfac7fa28ec7779843be}, intrahash = {7a6d06d5da3423c6c21fe8f809c0e6bd}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {- Free Puranas Sanctity Seed Service Vedas all and are at child daughter-Adaption etc greater is key medicines of one’s or others place selflessness services-Free social son than the time times to trees water-Plantation – –Help}, language = {English}, month = feb, number = 2, pages = {56-61}, timestamp = {2021-04-13T11:15:45.000+0200}, title = {Social Service in Puranas }, url = {https://www.ijtsrd.com/humanities-and-the-arts/sanskrit/38347/social-service-in-puranas/dr-n-venkatesha-rao}, volume = 5, year = 2021 } @article{noauthororeditor, abstract = {The most versatile and ideal path for sharing the data is delivered by Cloud figuring. Distributed computing consequently brings numerous advantages for the users. However, an issue exists when a user wants to redistribute the important data in cloud. Essentially, it is imperative to put cryptographically expanded admittance control on such data. In this way, empowering crypto graphical crude is expected to fabricate a sensible data sharing framework, i.e., Identity based encryption. The entrance control in this Identity based encryption isnt fixed. For the safety purpose, a component must be actualized where a user is taken out from the framework when his her approval is ended. Subsequently, the user which is taken out cant get to the mutual data any longer. Therefore, the regressive forward unidentified of the ciphertext ought to be given by a methodology which is recognized as revocable storage identity based encryption RS IBE . This methodology familiarizes the utilities of user disavowal and ciphertext update simultaneously. Also, we stretch a fact by fact assembly of RS IBE, which affirms its unknown in the represented security model. The practical and economically perception plan of data distribution is proficient through this RS IBE conspire which takes gigantic compensations of operability and capability. Unquestionably, we stretch implementation outcome of this suggested strategy to decide its opportunity. Midhun Madhu | Feon Jaison "Identity based Encryption Utilizing Revocable Capacity of Distributed Computing in Secure Information" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35712.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35712/identity-based-encryption-utilizing-revocable-capacity-of-distributed-computing-in-secure-information/midhun-madhu }, added-at = {2020-12-02T12:24:38.000+0100}, author = {Jaison, Midhun Madhu | Feon}, biburl = {https://www.bibsonomy.org/bibtex/2b072f8cf4e9490acab44d0f1b6f0a76a/ijtsrd}, interhash = {f678dbb73179d02bc6d2d6c8a21fa561}, intrahash = {b072f8cf4e9490acab44d0f1b6f0a76a}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Cloud Computing Data Exposure Key RS_IBE Revocation Sharing Storage}, language = {English}, month = sep, number = 6, pages = {1552-1555}, timestamp = {2020-12-02T12:24:38.000+0100}, title = {Identity based Encryption Utilizing Revocable Capacity of Distributed Computing in Secure Information }, url = {https://www.ijtsrd.com/computer-science/computer-security/35712/identity-based-encryption-utilizing-revocable-capacity-of-distributed-computing-in-secure-information/midhun-madhu}, volume = 4, year = 2020 } @article{noauthororeditor, abstract = {The purpose of this paper is to analyze in general the process of testing games and describe in more detail all the aspects of test phases in a game development process. The game industry has grown significantly in the last decade and many companies have started to use software engineering techniques in the game development process. All developing processes and products are subjected to test, for validation and verification. Modern software testing techniques can be easily used in game development as well, however it is not easy to test a game due to its complexity, but customers and managers are putting hard constraints on a game quality more and more frequently. Effective testing techniques can reduce the testing times and improve game quality and production time. Nimisha Karumathil "Software Game Testing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31336.pdf Paper Url :https://www.ijtsrd.com/computer-science/other/31336/software-game-testing/nimisha-karumathil }, added-at = {2020-07-16T12:46:50.000+0200}, author = {Karumathil, Nimisha}, biburl = {https://www.bibsonomy.org/bibtex/2d3c3939238851ce7548da1db72ef5140/ijtsrd}, interhash = {96ab6acb1ae621af10c76f24b5be7979}, intrahash = {d3c3939238851ce7548da1db72ef5140}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Challenges Dynamic Game Key Methodologies Software Static Testing Validation Verification and of}, language = {English}, month = {june}, number = 4, pages = {1471-1473}, timestamp = {2020-07-16T12:46:50.000+0200}, title = {Software Game Testing }, url = {https://www.ijtsrd.com/computer-science/other/31336/software-game-testing/nimisha-karumathil}, volume = 4, year = 2020 } @article{noauthororeditor, abstract = {This system proposes a centralized system for replica identification. The network is divided into segments and an inspection node is chosen for each segment. Inspection node identifies a clone node by checking the nodes ID and cryptographic key. In this process, Chord algorithm is used to detect the clone node, every node is assigned with random key, before it transmits the data it has to give its key which would be verified by the witness node. If same key is given by another node then the witness node identifies the cloned node. Here every node only needs to know the neighbor list containing all neighbor IDs and its location. In this scheme, Energy Efficient Clustering Protocol EECP protocol is used to implement different energy saving methods. Dr. B. R. Tapas Bapu | Hemavathi S U | Poonkuzhali K | Sweety J "Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-4 , June 2020, URL: https://www.ijtsrd.com/papers/ijtsrd31257.pdf Paper Url :https://www.ijtsrd.com/engineering/computer-engineering/31257/network-security-enhancement-in-wsn-by-detecting-misbehavioural-activity-as-copy-cat-nodes/dr-b-r-tapas-bapu }, added-at = {2020-07-16T11:51:02.000+0200}, author = {J, Dr. B. R. Tapas Bapu | Hemavathi S U | Poonkuzhali K | Sweety}, biburl = {https://www.bibsonomy.org/bibtex/29ea0525276da2c91eb700d84ab83371e/ijtsrd}, interhash = {31bfcae04afd845cca0bc9a01664f7e5}, intrahash = {9ea0525276da2c91eb700d84ab83371e}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Chord Clone Computer Cryptographic Distributed Engineering Hash Networks Node Sensor Table Wireless Witness algorithm key node}, language = {English}, month = {june}, number = 4, pages = {1098-1103}, timestamp = {2020-07-16T11:51:02.000+0200}, title = {Network Security Enhancement in WSN by Detecting Misbehavioural Activity as Copy Cat Nodes }, url = {https://www.ijtsrd.com/engineering/computer-engineering/31257/network-security-enhancement-in-wsn-by-detecting-misbehavioural-activity-as-copy-cat-nodes/dr-b-r-tapas-bapu}, volume = 4, year = 2020 } @article{noauthororeditor, abstract = {In the current tech world, there are multiple advancements being made in the field of Network Security, this is because devices are grouped into various networks and can be accessed remotely through the use of the internet. As a result, it is integral to ensure that only the authorized personnel are able to access and control the respective devices which are connected in the various networks. Mobile devices such as smart phones, laptops, tablets etc. have enabled users to access their information on the go at any time provided they have internet connectivity and are connected to the devices network. Otieno Godfrey Oduor "Review of Home Automation Systems and Network Security using IoT" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd30687.pdf }, added-at = {2020-06-10T08:23:10.000+0200}, author = {Oduor, Otieno Godfrey}, biburl = {https://www.bibsonomy.org/bibtex/29637784a66998574686c4e9420601aa5/ijtsrd}, interhash = {90933cea28984620d475caa99ecfeb38}, intrahash = {9637784a66998574686c4e9420601aa5}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {ANN Artificial DDoS Denial Distributed Infrastructure Internet IoT Key MQTT Message Networks Neural PKI Public Queuing Service Telemetry Things Transport of}, language = {English}, month = {April}, number = 3, pages = {805-808}, timestamp = {2020-06-10T08:23:10.000+0200}, title = {Review of Home Automation Systems and Network Security using IoT }, url = {https://www.ijtsrd.com/computer-science/artificial-intelligence/30687/review-of-home-automation-systems-and-network-security-using-iot/otieno-godfrey-oduor}, volume = 4, year = 2020 } @article{noauthororeditor, abstract = {A deadlock occurs when there is a setoff process waiting for a resource held by the other processes in the same set. This paper describes the deadlock detection and prevention using wait for graph and some deadlock resolution algorithms which resolves the deadlock by selecting victims using different criteria. In a multi process system, deadlock is a situation, which arises in a shared resource environment where a process indefinitely waits for a resource, which is held by some other process, which in turn waiting for a resource held by some other process. To prevent any deadlock situation in the system, the DBMS aggressively inspects all the operations which transactions are about to execute. DBMS inspects operations and analyzes if they can create a deadlock situation. If it finds that a deadlock situation might occur, then that transaction is never allowed to be executed. Durgesh Raghuvanshi "Deadlock in DBMS" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-3 , April 2020, URL: https://www.ijtsrd.com/papers/ijtsrd24064.pdf }, added-at = {2020-06-10T08:19:37.000+0200}, author = {Raghuvanshi, Durgesh}, biburl = {https://www.bibsonomy.org/bibtex/2f352fb203bbb99c1c2c896d044172be1/ijtsrd}, interhash = {3e8112ad0138138694fd0f3ced9cfd83}, intrahash = {f352fb203bbb99c1c2c896d044172be1}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {(DBMS) Databases allocation key management planning super system}, language = {English}, month = {April}, number = 3, pages = {795-796}, timestamp = {2020-06-10T08:19:37.000+0200}, title = {Deadlock in DBMS }, url = {https://www.ijtsrd.com/engineering/computer-engineering/24064/deadlock-in-dbms/durgesh-raghuvanshi}, volume = 4, year = 2020 } @article{noauthororeditor, abstract = {Key Frame Extraction is the summarization of videos for different applications like video object recognition and classification video retrieval and archival and surveillance is an active research area in computer vision. In this paper describe a new criterion for well presentative key frames and correspondingly create a key frame selection algorithm based Two stage Method. A two stage method is used to extract accurate key frames to cover the content for the whole video sequence. Firstly an alternative sequence is got based on color characteristic difference between adjacent frames from original sequence. Secondly by analyzing structural characteristic difference between adjacent frames from the alternative sequence the final key frame sequence is obtained. And then an optimization step is added based on the number of final key frames in order to ensure the effectiveness of key frame extraction. Khaing Thazin Min | Wit Yee Swe | Yi Yi Aung | Khin Chan Myae Zin "Key Frame Extraction in Video Stream using Two-Stage Method with Colour and Structure" Published in International Journal of Trend in Scientific Research and Development (ijtsrd) ISSN: 2456-6470 Volume-3 | Issue-5 August 2019 URL: https://www.ijtsrd.com/papers/ijtsrd27971.pdfPaper URL: https://www.ijtsrd.com/computer-science/data-processing/27971/key-frame-extraction-in-video-stream-using-two-stage-method-with-colour-and-structure/khaing-thazin-min }, added-at = {2019-09-13T07:55:24.000+0200}, author = {Zin, Khaing Thazin Min | Wit Yee Swe | Yi Yi Aung | Khin Chan Myae}, biburl = {https://www.bibsonomy.org/bibtex/280d7e2ffbfce2f654036efce3fb3aa02/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd27971}, interhash = {0cee5ed2061adb37f6a2770fb81b9dd0}, intrahash = {80d7e2ffbfce2f654036efce3fb3aa02}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Database Processing colour extraction frame key method structure two-state}, language = {English}, month = aug, number = 5, pages = {2536-2538}, timestamp = {2019-09-13T07:55:24.000+0200}, title = {Key Frame Extraction in Video Stream using Two Stage Method with Colour and Structure }, url = {https://www.ijtsrd.com/computer-science/data-processing/27971/key-frame-extraction-in-video-stream-using-two-stage-method-with-colour-and-structure/khaing-thazin-min}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {Multiple hosts wish to receive the same data from one or more senders. Multicast routing defines extensions to IP routers to support broadcasting data in IP networks. Multicast data is sent and received at a multicast address which defines a group. Data is sent and received in multicast groups via routing trees from sender s to receivers. Demonstrative lectures require to share the computer screen of the lecturer to the students as well as to make discussion with the students. The Multicast protocol is the most suitable method because of its capability in speed and better synchronized process. The word multicast is typically used to refer to IP multicast which is often employed for streaming media, and Internet television applications. Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi Aung "Classroom Shared Whiteboard System using Multicast Protocol" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd27976.pdfPaper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27976/classroom-shared-whiteboard-system-using-multicast-protocol/wit-yee-swe }, added-at = {2019-09-13T07:54:36.000+0200}, author = {Aung, Wit Yee Swe | Khaing Thazin Min | Khin Chan Myae Zin | Yi Yi}, biburl = {https://www.bibsonomy.org/bibtex/262482a60208ea70f42eeaf66229eacbb/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd27976}, interhash = {2a3e47297a35e823f71d92032ff96d6d}, intrahash = {62482a60208ea70f42eeaf66229eacbb}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Data Processing colour extraction frame key method structure two-state}, language = {English}, month = aug, number = 5, pages = {2533-2535}, timestamp = {2019-09-13T07:54:36.000+0200}, title = {Classroom Shared Whiteboard System using Multicast Protocol }, url = {https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/27976/classroom-shared-whiteboard-system-using-multicast-protocol/wit-yee-swe}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {RSA RivestShamirAdleman is an algorithm used by modern computers to encrypt and decrypt messages. The purpose of the paper is how to produce two different keys. This is also called public key cryptography because one of the keys can be given to anyone. In this paper also represent how to separate unwanted character by using Linux command. Soe Moe Myint | Moe Moe Myint | Aye Aye Cho "A Study of RSA Algorithm in Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd) ISSN: 2456-6470 Volume-3 | Issue-5 August 2019 URL: https://www.ijtsrd.com/papers/ijtsrd26749.pdfPaper URL: https://www.ijtsrd.com/computer-science/database/26749/a-study-of-rsa-algorithm-in-cryptography/soe-moe-myint }, added-at = {2019-09-12T11:33:02.000+0200}, author = {Cho, Soe Moe Myint | Moe Moe Myint | Aye Aye}, biburl = {https://www.bibsonomy.org/bibtex/2015293c9d899cc552dba5149dc49b64e/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd26749}, interhash = {ab7f6f902712f4142842ef7d056b16cd}, intrahash = {015293c9d899cc552dba5149dc49b64e}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Databases RSA algorithm key private public}, language = {English}, month = aug, number = 5, pages = {1670-1674}, timestamp = {2019-09-12T11:33:02.000+0200}, title = {A Study of RSA Algorithm in Cryptography }, url = {https://www.ijtsrd.com/computer-science/database/26749/a-study-of-rsa-algorithm-in-cryptography/soe-moe-myint}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {Face recognition is a kind of automatic human identification from face images has been performed widely research in image processing and machine learning. Face image facial information of the person is presented and unique information for each person even two person possessed the same face. We propose a methodology for automatic human classification based on Binary Robust Invariant Scalable Keypoints BRISK feature of face images and the normal distribution model. In our proposed methodology the normal distribution model is used to represent the statistical information of face image as a global feature. The human name is the output of the system according to the input face image. Our proposed feature is applied with Artificial Neural Networks to recognize face for human identification. The proposed feature is extracted from the face image of the Extended Yale Face Database B to perform human identification and highlight the properties of the proposed feature. Khin Mar Thi "Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model" Published in International Journal of Trend in Scientific Research and Development (ijtsrd) ISSN: 2456-6470 Volume-3 | Issue-5 August 2019 URL: https://www.ijtsrd.com/papers/ijtsrd26589.pdfPaper URL: https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi }, added-at = {2019-09-12T08:28:36.000+0200}, author = {Thi, Khin Mar}, biburl = {https://www.bibsonomy.org/bibtex/273d28954ff969e786863e11ced2ef745/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd26589}, interhash = {42ca00e220eed171dfef7bfb1ae7fd3e}, intrahash = {73d28954ff969e786863e11ced2ef745}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {(ANN) (BRISK) Artificial B Binary Database Extended Face Invariant Key Multimedia Networks Neural Normal Robust Scalable The Yale distribution face human identification images model points recognition}, language = {English}, month = aug, number = 5, pages = {1139-1143}, timestamp = {2019-09-12T08:28:36.000+0200}, title = {Face Recognition for Human Identification using BRISK Feature and Normal Distribution Model }, url = {https://www.ijtsrd.com/computer-science/multimedia/26589/face-recognition-for-human-identification-using-brisk-feature-and-normal-distribution-model/khin-mar-thi}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {Make In India, is buzzword initiated for the sole purpose of inviting various commercial sectors from all around the world, to engineer their products in India and sell them anywhere they wish. The crusade had instigated on 25th September 2014, and since then has emerged as one of the grandest triumphs of the Indian economy. Both the policies seem to benefit the Indian economy in their respective ways. On one hand, Make in India will boost foreign investments in the economy and on the other, Made in India will help the country being self reliant in terms of manufacturing of products. Therefore, a logical route is needed to be adopted. India is expected to be the third largest consumer economy as its consumption may triple to US$ 4 trillion by 2025, owing to shift in consumer behavior and expenditure pattern, according to a Boston Consulting Group BCG report and is estimated to surpass USA to become the second largest economy in terms of purchasing power parity PPP by the year 2040, according to a report by PricewaterhouseCoopers. With this initiative, Mr. Modi is literally inviting the rich and semi rich countries to step in India and invest their money for the future of India. It's like inviting the countries to set up their companies in India and manufactured in the territory of our country. Sell everywhere but manufacture in India sums it up all. Dr. Richa Srivastava ""Impact of “Make in India” in Indian Economy"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23728.pdf Paper URL: https://www.ijtsrd.com/economics/commerce/23728/impact-of-%E2%80%9Cmake-in-india%E2%80%9D-in-indian-economy/dr-richa-srivastava }, added-at = {2019-07-04T14:05:14.000+0200}, author = {Srivastava, Dr. Richa}, biburl = {https://www.bibsonomy.org/bibtex/2041d89e2927ab4c184406f38c777657a/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd23728}, interhash = {cbda8622d2327bfc92b3744378e75971}, intrahash = {041d89e2927ab4c184406f38c777657a}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Commerce Differences Economy GDP Growth Impact In India Indian Key Made Make On}, language = {English}, month = may, number = 4, pages = {429-432}, timestamp = {2019-07-04T14:05:14.000+0200}, title = {Impact of "Make in India" in Indian Economy }, url = {https://www.ijtsrd.com/economics/commerce/23728/impact-of-%E2%80%9Cmake-in-india%E2%80%9D-in-indian-economy/dr-richa-srivastava}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {Digital marketing is the marketing of products or services using digital technologies, mainly on the Internet, but also including mobile phones, display advertising, and any other digital medium. Digital marketings development since the 1990s and 2000s has changed the way brands and businesses use technology for marketing. As digital platforms are increasingly incorporated into marketing plans and everyday life, and as people use digital devices instead of visiting physical shops, digital marketing campaigns are becoming more prevalent and efficient. This paper mainly focuses on conceptual understanding of digital marketing, how digital marketing helps today’s business and some cases in the form of examples. Dr. Mrs. Vaibhava Desai "Digital Marketing: A Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Special Issue | Fostering Innovation, Integration and Inclusion Through Interdisciplinary Practices in Management , March 2019, URL: https://www.ijtsrd.com/papers/ijtsrd23100.pdfPaper URL: https://www.ijtsrd.com/management/marketing/23100/digital-marketing-a-review/dr-mrs-vaibhava-desai }, added-at = {2019-06-29T11:37:16.000+0200}, author = {Desai, Dr. Mrs. Vaibhava}, biburl = {https://www.bibsonomy.org/bibtex/266d7e86fe1ba922af8a5c55b9e28ff58/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd23100}, interhash = {9a89b8966fe340c4b1d7ab056e6bc2ad}, intrahash = {66d7e86fe1ba922af8a5c55b9e28ff58}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {consumers engines indicators key mail media performance search}, language = {English}, month = {March}, pages = {196-200}, timestamp = {2019-06-29T11:37:16.000+0200}, title = {Digital Marketing A Review }, url = {https://www.ijtsrd.com/management/marketing/23100/digital-marketing-a-review/dr-mrs-vaibhava-desai}, volume = {Special Issue}, year = 2019 } @article{noauthororeditor, abstract = {Cloud computing is the emerging trend in today's world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important data's in a third parties place .Here comes the major issue of how our data's are secured. In this paper, we discuss about how to protect our data's in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf }, added-at = {2019-05-29T10:02:25.000+0200}, author = {H, Padmapriya I | Ragini}, biburl = {https://www.bibsonomy.org/bibtex/2693e8873850bdf60333d40025b98fa69/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd21547}, interhash = {d8e0205410a3bbcd513ad20ff0267e55}, intrahash = {693e8873850bdf60333d40025b98fa69}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Public cipher decryption encryption key private text}, language = {English}, month = feb, number = 2, pages = {972-973}, timestamp = {2019-05-29T10:02:25.000+0200}, title = {Cloud Cryptography }, url = {https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i}, volume = 3, year = 2019 } @article{noauthororeditor, abstract = {To obtain secured communication in Wireless Sensor Systems WSS , a secret shared keys is created between sensor nodes and neighboring nodes. The shortest path is found by using Dijkstra's Algorithm. By the use of this algorithm the energy consumption will be reduced. In this paper, location based key for WSS, with proper attention over the insider attacks is proposed. After reviewing and analysing present key management systems, Location Based Key LBK management is selected. To deal with the communication interference problem in LBK, a new key revision technique that involves grid-based location information is devised. Furthermore, a key renew and cancellation processes is constructed to withstand inside attackers in OFDM antenna. For analysis, a accurate simulation is conducted and proved that can increases connectivity and decreases the compromise ratio when the least possible number of common keys needed for key establishment is high. Dr. G. Karpaga Rajesh M.E., Ph.D | Vaishnu Priya. R | Kaviya R | Jaya Divya Aj "Security using Location Based Key (LBK) System for Effective Multipath Attack and Protection for Location Discrimination in Wireless Sensor Systems" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21377.pdf }, added-at = {2019-05-24T10:34:47.000+0200}, author = {Dr. G. Karpaga Rajesh M.E., Ph.D | Vaishnu Priya. R | Kaviya R | Jaya Divya Aj}, biburl = {https://www.bibsonomy.org/bibtex/2811e286ae2d515acda20f29c4ab09e7f/ijtsrd}, doi = {https://doi.org/10.31142/ijtsrd21377}, interhash = {e829ab0a539432d40f1bd1b58be807c6}, intrahash = {811e286ae2d515acda20f29c4ab09e7f}, issn = {2456-6470}, journal = {International Journal of Trend in Scientific Research and Development}, keywords = {Algorithm Attacks Based Dijkstras Key LBK Location Multipath Security Sensor Systems Wireless}, language = {English}, month = feb, number = 2, pages = {446-450}, timestamp = {2019-05-24T10:34:47.000+0200}, title = {Security using Location Based Key LBK System for Effective Multipath Attack and Protection for Location Discrimination in Wireless Sensor Systems }, url = {https://www.ijtsrd.com/other-scientific-research-area/other/21377/security-using-location-based-key-lbk-system-for-effective-multipath-attack-and-protection-for-location-discrimination-in-wireless-sensor-systems/dr-g-karpaga-rajesh-me-phd}, volume = 3, year = 2019 }