353 research outputs found

    Integration of Configurable Dynamic Notification System with CSIBER Website

    Get PDF
    In this digital era every academic institution and commercial setup investments enormously in hosting and maintenance of the website which plays a critical role in the success of an organization by making it reachable across wide geographical area at any time. A carefully designed website reflects institute’s best assets and delivers tremendous first-hand information to any user at any time irrespective of his/her geographical location. To stay in market there is a constant requirement for changing the look and feel and content of the website and incorporating dynamism into the website. It is inevitable to keep the website constantly updated since it is accessible to the public. As the new website data pertaining to event information, notification etc is constantly generated and old data soon becomes obsolete, it demands for continuous manual efforts from the human resource to keep the dynamically changing data current and up-to-date. It can save tremendous amount of human effort and time, if such a task is automated which in turn enables meaningful data to be displayed on the website with very little human intervention. To facilitate this new technologies such as jQuery, JSON, angular JS etc. are emerging continuously to name a few. In the current paper, the author has proposed an algorithm for the integration of dynamic notification system with existing website of CSIBER. The algorithm is implemented in PHP and MySQL and hosted on web server employing the web hosting service availed by the organization. The dynamic module is scheduled to be executed periodically on a daily basic by the Cron utility and server-side include is dynamically created and embedded in home page. Every month’s events can be scheduled and stored in the backend database which is parsed by dynamic module and the required data is accordingly generated. As a measure towards efficiency improvement, the tool is executed once per day instead of executing it for every user request. Two options are proposed for integration, one on client-side and the second one on the server-side. The dialog displaying the notification data is rendered mobile friendly and is subject to Google’s mobile friendly test

    Biosorption of Fluoride from Synthetic and Ground Water Using Chlorella vulgaris Immobilized in Calcium Alginate Beads in an Upflow Packed Bed Column

    Get PDF
    The potential of immobilized Chlorella vulgaris to remove fluoride from synthetic and real ground water samples in a fixed bed was investigated. The effect of important kinetic parameters including column bed height, feed flow rate and influent fluoride concentration of solution on fluoride removal was studied. Thomas, Yoon-Nelson, and BDST models were used to analyze the experimental data and understand the influence on biosorption performance. The models’ predictions were in good agreement with the experimental data for all the process parameters studied, indicating that the models were suitable for fixed-bed column design. Fluoride adsorption was reversible. Desorption of fluoride ions was accomplished by pumping 0.1 N HCl solution. The reusability of adsorbent was studied by subjecting column to repeated cycles of fluoride adsorption and desorption. The suitability of immobilized C. vulgaris adsorbent for fluoride removal from ground water samples of Pavagada taluk, Tumakuru district was studied in the packed column

    Hybrid Security Framework for Activity Based Authentication using RSA & Genetic Algorithm

    Get PDF
    In the current information age, security has achieved a tremendous importance in e-commerce applications involving financial transactions. Non-repudiation, data integrity, data confidentiality and authenticity, have become an integral part of information security. There is a tremendous risk involved in the communication of a plain text over Internet. Cryptography offers a solution for this type of risk which is referred to as a technique of encrypting and decrypting messages in such a way that they cannot be interpreted by anybody with the exception of a sender and an intended recipient. In majority of the e-commerce based applications where security is considered to be of prime importance, a single encryption algorithm is adopted for encrypting a password and the authentication information is stored on a single database server which becomes open to risks against different computer hacks. A novel solution for this problem is to generate an individual’s personal and dynamic activities which will be hard for the attackers to guess. Further, this can be combined with distributed technology where the authentication information is distributed over geographically separated multiple servers. In this paper authors have generated an activity based distributed 3D password incorporating various activities where the authentication information is distributed over geographically separated multiple authentication servers. The key pair is generated using RSA algorithm which is encrypted using single-point cross over and mutation of bits at the extreme position. This further adds another level of security and renders the key unbreakable by an unintended user. The configuration information pertaining to the distributed environment is stored in XML file which is parsed using Microsoft's XML Parser and the activity related information is stored in different servers which is encrypted using RSA algorithm. The technique employed combines RSA algorithm with Genetic Algorithm to offer a robust hybrid security framework in a distributed environment which is difficult to guess for an unintended user

    Stress Testing and Its Role in Coronary Artery Disease

    Get PDF

    JSP Custom Tag for Pagination, Sorting and Filtering – A Case Study

    Get PDF
    Tag libraries have the power of reducing complex functionalities to one liners by separating out implementation part from tag declarations. Tags do hide the implementation specific tasks from the end user by making the code more readable. The frequently and widely used functionality in any application is database operations which involve lot of code repetition. Such a repeated code can be hidden behind a couple of custom tags where the end user can be concerned only with the tag usage which renders the application bug free and also aids in rapid application development. Majority of automation softwares at the minimal incorporate functionalities for interaction with repository of data . The need for quick searching of required data and retrieving subsets of data demand sorting, pagination, and filtering capabilities to be an integral part of any application. With the exponential growth in data these functionalities become mandatory to be incorporated in any application irrespective of its type and size. Further, Rich Internet Application (RIA) demands an attractive graphical user interface providing visual clues on the type of data to be entered or to be displayed. In order to cater a solution to this issue, in the current paper, the authors have designed and implemented a JSP custom tag for displaying a database table data in columns of different types such as check boxes, images, hyperlinks etc. Boolean attributes are added to the tag for enabling one or more of the features corresponding to pagination, sorting and filtering

    Design and Development of Deterministic Finite Automata Parser for Querying Hardware and Software Configuration Information of Local Area Network

    Get PDF
    A typical Local Area Network (LAN) of an educational institution hosts different hardware devices and contains numerous softwares installed, serving the needs of persons from low technical expertise to high technical standards. Further as the academic curriculum is upgraded most of the existing softwares become obsolete and new softwares are installed or existing softwares are upgraded to new version to cater the needs which is a continuous process. To address such issues, a quick and reliable snapshot of the network configuration is desirable at any point of time. On many occasions the softwares with limited usage are installed only on few machines of a LAN. Thus, it proves to be a time consuming task to search the whole network for a single rarely used software. To tackle such issues the authors in the current paper have provided a first hand tool for automating the process of discovering LAN configuration, storing it persistently and querying the stored information in human language. The entire process is automated without any human intervention. The information pertaining to the hardware and software configuration is stored in a persistent Relational DataBase Management System (RDBMS) which can be manipulated by the tool automatically as the new hardware is connected to a LAN or a software configuration changes. The end user instead of querying the database directly will use the natural language, termed as Hardware Query Language (HQL) and Software Query Language (SOQL) designed by the authors, which is interfaced with RDBMS using DFA parser implemented by the authors. To implement HQL/SOQL, a finite set of symbols, words and language rules are defined which together constitute HQL/SOQL grammar. In this paper we present a deterministic finite automata (DFA) parser developed by us for parsing HQL/SOQL tokens. The state table and state diagrams are developed for different tokens of HQL/SOQL identified by us. State information is stored in a persistent database management system as a measure towards improving efficiency and extensibility. Currently, HQL/SOQL consists of only few commands and more commands will be added to HQL/SOQL command set in near future. The reports generated are exported to MS Word using Microsoft Word 12.0 object library

    Glimpses of Semantic Web Technologies and Related Case Studies

    Get PDF
    Semantic web is a platform of new evolution in rapidly developing World Wide Web. Semantic web refers to extracting knowledge from large amount of data. The purpose of this paper is to give a first-hand information and description for the semantic web technology. Although several research works have been carried out in the high semantic web technology, the semantic web is yet vastly unexplored. A semantic web technological innovation is rapidly changing traditional methods of searching data and how search engines work. Few prominent semantic web case studies are presented. One of the popular applications of XML RDF is Really Simple Syndication (RSS) feed which is discussed in detail

    Survey Paper on CP-ABE cloud computing

    Full text link
    In attribute based encryption (ABE) scheme, attributes plays a very important role. Attribute –based encryption provides privacy protection for the users by a set of attributes. Now a days as cloud is most widely used in mostly all fields so there is need of keeping data more secure and confidential which is outsourced on the cloud. Security of the data in cloud database server is the key area of concern in the acceptance of cloud. It is required very high degree of privacy and authentication. In existing system used hierarchical authorization structure to reduce the burden and risk of a single authority .this paper proposes a hierarchical attribute based encryption which directly provides attribute value by user as well as data stored in different types of media

    Custom Annotation for Execution of Data Manipulation Commands in a Generic Manner ? A Case Study

    Get PDF
    Java annotations are the tags employed for providing meta data for Java code. They can be attached to a class, method, or a field to provide some additional information to the compiler and JVM. This paper introduces the concept of Annotations in Java with an emphasis on various in-built annotations in Java and the annotations that are used by other annotations. The reader is introduced to J2EE standard annotations and those employed by Hibernate as a replacement for XML-based mapping document. Steps in designing and using custom annotations are highlighted. A custom annotation design is illustrated with the help of an example for execution of DML commands in a generic way in a database management system independent manner

    Struts, Hibernate and Spring Integration ? A Case Study

    Get PDF
    Over the last few decades software development has undergone tremendous radical changes in order to enhance user experience, user friendliness and to widen its scope over large geographical area. The key actors in this arena are two leading IT companies Microsoft and Sun Microsystems, now taken owner by Oracle Inc. who compete on a continual basis for rendering rapid professional software design and development process at the same time incorporating more functionality and focusing strongly towards software maintenance issues. Due to this intense competition, the ultimate beneficiary is a software developer who is tremendously benefited at large. In this review paper, the researcher aims at consolidating the technological advancements that have brought a revolutionary change in corporate software development over last few decades. The main substance of the paper is technological advancements facilitating J2EE application development viz., struts framework, hibernate and spring framework which operate in different layers of scalable N-tier architecture. Each technology has its own merits and de-merits. The researcher attempts to aggregate the benefits offered by the trio in a single J2EE application thereby bringing in best of three worlds to a single application. The application is boosted with powerful struts tag library, persistent layer provided by hibernate and dependency injection or Inversion of Control (IoC) user the same roof. A case study is presented to demonstrate the integration of three diverse technologies, struts, hibernate and spring. JBOSS application server is employed as a container for J2EE components
    • …
    corecore