Abstract: Advent enhancements in the field of computing have
increased massive use of web based electronic documents. Current
Copyright protection laws are inadequate to prove the ownership for
electronic documents and do not provide strong features against
copying and manipulating information from the web. This has
opened many channels for securing information and significant
evolutions have been made in the area of information security.
Digital Watermarking has developed into a very dynamic area of
research and has addressed challenging issues for digital content.
Watermarking can be visible (logos or signatures) and invisible
(encoding and decoding). Many visible watermarking techniques
have been studied for text documents but there are very few for web
based text. XML files are used to trade information on the internet
and contain important information. In this paper, two invisible
watermarking techniques using Synonyms and Acronyms are
proposed for XML files to prove the intellectual ownership and to
achieve the security. Analysis is made for different attacks and
amount of capacity to be embedded in the XML file is also noticed.
A comparative analysis for capacity is also made for both methods.
The system has been implemented using C# language and all tests are
made practically to get the results.
Abstract: Electronic commerce is growing rapidly with on-line
sales already heading for hundreds of billion dollars per year. Due to
the huge amount of money transferred everyday, an increased
security level is required. In this work we present the architecture of
an intelligent speaker verification system, which is able to accurately
verify the registered users of an e-commerce service using only their
voices as an input. According to the proposed architecture, a
transaction-based e-commerce application should be complemented
by a biometric server where customer-s unique set of speech models
(voiceprint) is stored. The verification procedure requests from the
user to pronounce a personalized sequence of digits and after
capturing speech and extracting voice features at the client side are
sent back to the biometric server. The biometric server uses pattern
recognition to decide whether the received features match the stored
voiceprint of the customer who claims to be, and accordingly grants
verification. The proposed architecture can provide e-commerce
applications with a higher degree of certainty regarding the identity
of a customer, and prevent impostors to execute fraudulent
transactions.
Abstract: The effects of global warming on India vary from the
submergence of low-lying islands and coastal lands to the melting of
glaciers in the Indian Himalayas, threatening the volumetric flow rate
of many of the most important rivers of India and South Asia. In
India, such effects are projected to impact millions of lives. As a
result of ongoing climate change, the climate of India has become
increasingly volatile over the past several decades; this trend is
expected to continue.
Climate change is one of the most important global environmental
challenges, with implications for food production, water supply,
health, energy, etc. Addressing climate change requires a good
scientific understanding as well as coordinated action at national and
global level. The climate change issue is part of the larger challenge
of sustainable development. As a result, climate policies can be more
effective when consistently embedded within broader strategies
designed to make national and regional development paths more
sustainable. The impact of climate variability and change, climate
policy responses, and associated socio-economic development will
affect the ability of countries to achieve sustainable development
goals.
A very well calibrated Soil and Water Assessment Tool (R2 =
0.9968, NSE = 0.91) was exercised over the Khatra sub basin of the
Kangsabati River watershed in Bankura district of West Bengal,
India, in order to evaluate projected parameters for agricultural
activities. Evapotranspiration, Transmission Losses, Potential
Evapotranspiration and Lateral Flow to reach are evaluated from the
years 2041-2050 in order to generate a picture for sustainable
development of the river basin and its inhabitants.
India has a significant stake in scientific advancement as well as
an international understanding to promote mitigation and adaptation.
This requires improved scientific understanding, capacity building,
networking and broad consultation processes. This paper is a
commitment towards the planning, management and development of
the water resources of the Kangsabati River by presenting detailed
future scenarios of the Kangsabati river basin, Khatra sub basin, over
the mentioned time period.
India-s economy and societal infrastructures are finely tuned to the
remarkable stability of the Indian monsoon, with the consequence
that vulnerability to small changes in monsoon rainfall is very high.
In 2002 the monsoon rains failed during July, causing profound loss
of agricultural production with a drop of over 3% in India-s GDP.
Neither the prolonged break in the monsoon nor the seasonal rainfall
deficit was predicted. While the general features of monsoon
variability and change are fairly well-documented, the causal
mechanisms and the role of regional ecosystems in modulating the
changes are still not clear. Current climate models are very poor at
modelling the Asian monsoon: this is a challenging and critical
region where the ocean, atmosphere, land surface and mountains all
interact. The impact of climate change on regional ecosystems is
likewise unknown. The potential for the monsoon to become more
volatile has major implications for India itself and for economies
worldwide. Knowledge of future variability of the monsoon system,
particularly in the context of global climate change, is of great
concern for regional water and food security.
The major findings of this paper were that of all the chosen
projected parameters, transmission losses, soil water content,
potential evapotranspiration, evapotranspiration and lateral flow to
reach, display an increasing trend over the time period of years 2041-
2050.
Abstract: Transient Stability is an important issue in power systems planning, operation and extension. The objective of transient stability analysis problem is not satisfied with mere transient instability detection or evaluation and it is most important to complement it by defining fast and efficient control measures in order to ensure system security. This paper presents a new Fuzzy Support Vector Machines (FSVM) to investigate the stability status of power systems and a modified generation rescheduling scheme to bring back the identified unstable cases to a more economical and stable operating point. FSVM improves the traditional SVM (Support Vector Machines) by adding fuzzy membership to each training sample to indicate the degree of membership of this sample to different classes. The preventive control based on economic generator rescheduling avoids the instability of the power systems with minimum change in operating cost under disturbed conditions. Numerical results on the New England 39 bus test system show the effectiveness of the proposed method.
Abstract: The Internet is the global data communications
infrastructure based on the interconnection of both public and private
networks using protocols that implement Internetworking on a global
scale. Hence the control of protocol and infrastructure development,
resource allocation and network operation are crucial and interlinked
aspects. Internet Governance is the hotly debated and contentious
subject that refers to the global control and operation of key Internet
infrastructure such as domain name servers and resources such as
domain names. It is impossible to separate technical and political
positions as they are interlinked. Furthermore the existence of a
global market, transparency and competition impact upon Internet
Governance and related topics such as network neutrality and
security. Current trends and developments regarding Internet
governance with a focus on the policy-making process, security and
control have been observed to evaluate current and future
implications on the Internet. The multi stakeholder approach to
Internet Governance discussed in this paper presents a number of
opportunities, issues and developments that will affect the future
direction of the Internet. Internet operation, maintenance and
advisory organisations such as the Internet Corporation for Assigned
Names and Numbers (ICANN) or the Internet Governance Forum
(IGF) are currently in the process of formulating policies for future
Internet Governance. Given the controversial nature of the issues at
stake and the current lack of agreement it is predicted that
institutional as well as market governance will remain present for the
network access and content.
Abstract: Rice, which is the staple food in Sierra Leone, is
consumed on a daily basis. It is the most imperative food crop
extensively grown by farmers across all ecologies in the country.
Though much attention is now given to rice grain production through
the small holder commercialization programme (SHCP), however, no
attention has been given in investigating the limitations faced by rice
producers. This paper will contribute to attempts to overcome the
development challenges caused by food insecurity. The objective of
this paper is thus, to analysis the relationship between rice production
and the domestic retail price of rice. The study employed a log linear
model in which, the quantity of rice produced is the dependent
variable, quantity of rice imported, price of imported rice and price of
domestic rice as explanatory variables. Findings showed that, locally
produced rice is even more expensive than the imported rice per ton,
and almost all the inhabitants in the capital city which hosts about
65% of the entire population of the country favor imported rice, as it
is free from stones with other impurities. On the other hand, to
control price and simultaneously increase rice production, the
government should purchase the rice from the farmers and then sell to private retailers.
Abstract: A mobile agent is a software which performs an
action autonomously and independently as a person or an
organizations assistance. Mobile agents are used for searching
information, retrieval information, filtering, intruder recognition in
networks, and so on. One of the important issues of mobile agent is
their security. It must consider different security issues in effective
and secured usage of mobile agent. One of those issues is the
integrity-s protection of mobile agents.
In this paper, the advantages and disadvantages of each method,
after reviewing the existing methods, is examined. Regarding to this
matter that each method has its own advantage or disadvantage, it
seems that by combining these methods, one can reach to a better
method for protecting the integrity of mobile agents. Therefore, this
method is provided in this paper and then is evaluated in terms of
existing method. Finally, this method is simulated and its results are
the sign of improving the possibility of integrity-s protection of
mobile agents.
Abstract: Biometric techniques are gaining importance for
personal authentication and identification as compared to the
traditional authentication methods. Biometric templates are
vulnerable to variety of attacks due to their inherent nature. When a
person-s biometric is compromised his identity is lost. In contrast to
password, biometric is not revocable. Therefore, providing security
to the stored biometric template is very crucial. Crypto biometric
systems are authentication systems, which blends the idea of
cryptography and biometrics. Fuzzy vault is a proven crypto
biometric construct which is used to secure the biometric templates.
However fuzzy vault suffer from certain limitations like nonrevocability,
cross matching. Security of the fuzzy vault is affected
by the non-uniform nature of the biometric data. Fuzzy vault when
hardened with password overcomes these limitations. Password
provides an additional layer of security and enhances user privacy.
Retina has certain advantages over other biometric traits. Retinal
scans are used in high-end security applications like access control to
areas or rooms in military installations, power plants, and other high
risk security areas. This work applies the idea of fuzzy vault for
retinal biometric template. Multimodal biometric system
performance is well compared to single modal biometric systems.
The proposed multi modal biometric fuzzy vault includes combined
feature points from retina and fingerprint. The combined vault is
hardened with user password for achieving high level of security.
The security of the combined vault is measured using min-entropy.
The proposed password hardened multi biometric fuzzy vault is
robust towards stored biometric template attacks.
Abstract: Extensive use of the Internet coupled with the
marvelous growth in e-commerce and m-commerce has created a
huge demand for information security. The Secure Socket Layer
(SSL) protocol is the most widely used security protocol in the
Internet which meets this demand. It provides protection against
eaves droppings, tampering and forgery. The cryptographic
algorithms RC4 and HMAC have been in use for achieving security
services like confidentiality and authentication in the SSL. But recent
attacks against RC4 and HMAC have raised questions in the
confidence on these algorithms. Hence two novel cryptographic
algorithms MAJE4 and MACJER-320 have been proposed as
substitutes for them. The focus of this work is to demonstrate the
performance of these new algorithms and suggest them as dependable
alternatives to satisfy the need of security services in SSL. The
performance evaluation has been done by using practical
implementation method.