5 research outputs found

    A Survey on Automatically Mining Facets for Web Queries

    Get PDF
    In this paper, a detailed survey on different facet mining techniques, their advantages and disadvantages is carried out. Facets are any word or phrase which summarize an important aspect about the web query. Researchers proposed different efficient techniques which improves the user’s web query search experiences magnificently. Users are happy when they find the relevant information to their query in the top results. The objectives of their research are: (1) To present automated solution to derive the query facets by analyzing the text query; (2) To create taxonomy of query refinement strategies for efficient results; and (3) To personalize search according to user interest

    Survey on Various Trust Management Issues in Cloud Environments

    Get PDF
    Over the past few years, trust management has been one of the hot topics especially in the area of cloud computing. Well-known benefits resulting from cloud computing adoption, several issues have emerged during its evolution: most of them relate to security, privacy and trust management. In particular, its proliferation has placed even more attention to trust management, representing one of the key challenges in the adoption of cloud computing technologies. This paper proposes a survey of existing trust management models addressing collaboration agreements in cloud computing scenarios. Main limitations of current approaches are outlined and possible improvements are traced, as well as a future research path

    Secure Data Storage on Cloud through Networking

    Get PDF
    Security, privacy issue and data protection is always one of the major issue which reduces the growth and make slow the speed of rising new technologies in the field of cloud computing. The advent of an advanced model should not negotiate with the required functionalities and capabilities present in the current model. Here to avoid risk and threaten are reduced in the new model the features are improved. In this paper, a survey of the different security risks that pose a threat to the cloud is presented. This paper is a survey more specific to the different security issues that has emanated due to the nature of the service delivery models of a cloud computing system

    ROBUST BARCODE RECOGNITION USING TEMPLATE MATCHING

    No full text
    Nowadays, barcodes are used in almost every single business. Many different Applications such as access control, price calculation uses barcodes for pricing. It is very informative in business environment. This barcode reading/recognizing task can be done by using traditional scanners but in other environments where the volume of information is very high and time is critical, hardware scanners are not the best choice. In such situations the proposed powerful software robust barcode reorganization can be used to read the critical / blurred images barcodes very accurately. In this paper we present an image processing procedure for barcode detection in image. The goal of our method is to improve the quality of the input image. The implementation details and the results obtained with the proposed method on real images are discussed.Implement an image processing based barcode recognition toolkit that can be used to eliminate the need for external proprietary hardware required to recognize barcode. The challenge in this paper is to be able to detect a barcode on an image and we have to account for the following situations: blurriness, slanted barcodes, light intensity of images, noise in images. There are many techniques that can be used in image processing and our group has invested in the Image Processing Toolbox in Java so that we will be able to use special function of template matching to identify our barcodes

    Keyed Intrusion Detection System for Key- Recovery Attacks

    No full text
    ABSTRACT:. With the anomaly detection systems, many techniques and approaches have been developed to track novel attacks on the systems. Anomaly detection systems used many algorithms and predefine rules; it's impossible to define all rules and algorithm and also once algorithm is known to attacker then new attack is created for same. To overcome this issue various machine learning schemes have been developed. One of such scheme is KIDS (Keyed Intrusion Detection System) which is depends on method used to generate KEY and secrecy of the KEY. Problem with KIDS is that attacker easily able to get key after grey box attack or black box attack. Hence improvement in KIDS system is required to provide more security with this attacks .Proposed system provides more security under both this attacks and also protect stored data. Proposed scheme can used to save data of various domains in cloud storage like for healthcare domain user can save the patient data. With the anomaly detection systems, many techniques and approaches have been developed to track novel attacks on the systems. Anomaly detection systems used many algorithms and predefine rules; it's impossible to define all rules and algorithm and also once algorithm is known to attacker then new attack is created for same. To overcome this issue various machine learning schemes have been developed. One of the such scheme is KIDS (Keyed Intrusion Detection System) which is depends on method used to generate KEY and secrecy of the KEY. Problem with KIDS is that attacker easily able to get key after grey box attack or black box attack. Hence improvement in KIDS system is required to provide more security with this attacks .Proposed system provides more security under both this attacks and also protect stored data. Proposed scheme can used to save data of various domains in cloud storage like for healthcare domain user can save the patient data
    corecore