Image and video processing perform a primepart in the growth of technologies for administer with ... more Image and video processing perform a primepart in the growth of technologies for administer with reliabilityaffairsThere has been endless stuff of misuse that have remains in banking transactions. Hence it is verynecessary to bring high security in banking sector. This paper proposes the confederation of Face Recognition System in the distinctivenessauthentication procedureused in ATMs to intensify the security system. Supervision cameras are extensively used as way of enormity minimization, and image examination techniques are used in the forensics domain. With the help of image stitching and image steganography, security will be given to any likeness.
Many sectors are taking interest in big data due to the huge potential associated with big data. ... more Many sectors are taking interest in big data due to the huge potential associated with big data. Big data demands large computing power and distributed storage to handle the data problems, to which cloud can provides the elastic on-demand compute power and storage to big data. Cloud data center can acts as infrastructure layer to big data. As the volume of big data is increasing with high speed, the cloud data centers are also scaling up. And they consume huge amount of energy to provide infrastructure layer to big data continuously. The aim of this paper is not to extensively cover big data, but to efficiently utilize cloud data centers for big data using virtualization, so that energy can be saved.
For any web application the connectivity with the server is always a crucial issue. Correctly acc... more For any web application the connectivity with the server is always a crucial issue. Correctly accessing the data and availability to user at the faster rate is the major issue. In classical approach, stateless request and response make refreshing of complete page. The AJAX engine improves the situation from complete reference to server to need base access. Ajax can help in making a new model, in which the single-page web interface is composed of individual components that can be updated / replaced independently. In this paper AJAX enabled web application model with comet programming is introduced and tested. Two approaches for long polling are considered namely, using UpdatePanel and using JSON. The experimental results are compared using Firebug tool provided by Mozilla Firefox.
In last decade, there have been enormous changes in the field of web applications. The phase has ... more In last decade, there have been enormous changes in the field of web applications. The phase has shifted from static to dynamic, and fixed layout has now taken the form of responsive layout, due to distribution of processing capabilities from server side to client side, mainly because of rich set of scripts for user interface and making request to server. This leads to reduction in network traffic. This is on the presumption of trustiness on client, eventually creating a web application more vulnerable. This paper will cover importance of each triad of web, mainly security with its service points. This will facilitate a developer to identify which service point is more important with respect to application requirements. It will also apply sufficient security checks at service point in each component of the application.
Malware is not defined in single word. It is collection of malicious code or instructions which s... more Malware is not defined in single word. It is collection of malicious code or instructions which spread through the connected system or internet. It’s using for gain illegally economic benefits and to damage other computer or network system. Malware detection is an important role in the cyber security. At present some anti malware software are used to detect malware, these are signature-based methods who cannot provide accurate result of malware attacks. Many metamorphic and polymorphic techniques are used to conceal the behavior of malicious program. These are the serious challenges to global security threat. Presently various malware detection techniques are available such as Heuristic based, Signature based and behavior based techniques. Most of the anti virus vendor uses signature based detection techniques, who already have known and well documented data base of signature value. Obfuscation and polymorphism technique impede the primary stage detection.
For any web application the connectivity with the server is always a crucial issue. Correctly acc... more For any web application the connectivity with the server is always a crucial issue. Correctly accessing the data and availability to user at the faster rate is the major issue. In classical approach, stateless request and response make refreshing of complete page. The AJAX engine improves the situation from complete reference to server to need base access. Ajax can help in making a new model, in which the single-page web interface is composed of individual components that can be updated/ replaced independently. In this paper AJAX enabled web application model with comet programming is introduced and tested. Two approaches for long polling are considered namely, using UpdatePanel and using JSON. The experimental results are compared using Firebug tool provided by Mozilla Firefox.
Information Retrieval deals with the representation, storage, organization of, and access to info... more Information Retrieval deals with the representation, storage, organization of, and access to information items. The representation and organization of information items should provide the user with easy access to the information with the rapid development of Internet, large amounts of digitally stored information is readily available on the World Wide Web. This information is so huge that it becomes increasingly difficult and time consuming for the users to find the information relevant to their needs. The explosive growth of information on the Internet has greatly increased the need for information retrieval systems. However, most of the search engines are using conventional information retrieval systems. An information system needs to implement sophisticated pattern matching tools to determine contents at a faster rate. AJAX has recently emerged as the new tool such the of information retrieval process of information retrieval can become fast and information reaches the use at a faster pace as compared to conventional retrieval systems.
Web applications are becoming a requisite mediator to provide access to the various on-line dynam... more Web applications are becoming a requisite mediator to provide access to the various on-line dynamic web services. As more features add to making interactive and efficient web applications, attackers get more options to bypass those vulnerabilities. According to OWASP Community, the number of web attacks is increasing drastically since last few years. Cross Site Scripting (XSS) is one of the vulnerabilities commonly found on websites which affects both the client and server as well. These types of attack usually take place due to vulnerabilities of User Interface. This paper discusses why the Cross Site Scripting Attack is so threatening and what are the potential consecutions of such kind of attacks. Further, this article provides an approach to user input sanitization techniques to prevent critical XSS attacks.
Image and video processing perform a primepart in the growth of technologies for administer with ... more Image and video processing perform a primepart in the growth of technologies for administer with reliabilityaffairsThere has been endless stuff of misuse that have remains in banking transactions. Hence it is verynecessary to bring high security in banking sector. This paper proposes the confederation of Face Recognition System in the distinctivenessauthentication procedureused in ATMs to intensify the security system. Supervision cameras are extensively used as way of enormity minimization, and image examination techniques are used in the forensics domain. With the help of image stitching and image steganography, security will be given to any likeness.
Many sectors are taking interest in big data due to the huge potential associated with big data. ... more Many sectors are taking interest in big data due to the huge potential associated with big data. Big data demands large computing power and distributed storage to handle the data problems, to which cloud can provides the elastic on-demand compute power and storage to big data. Cloud data center can acts as infrastructure layer to big data. As the volume of big data is increasing with high speed, the cloud data centers are also scaling up. And they consume huge amount of energy to provide infrastructure layer to big data continuously. The aim of this paper is not to extensively cover big data, but to efficiently utilize cloud data centers for big data using virtualization, so that energy can be saved.
For any web application the connectivity with the server is always a crucial issue. Correctly acc... more For any web application the connectivity with the server is always a crucial issue. Correctly accessing the data and availability to user at the faster rate is the major issue. In classical approach, stateless request and response make refreshing of complete page. The AJAX engine improves the situation from complete reference to server to need base access. Ajax can help in making a new model, in which the single-page web interface is composed of individual components that can be updated / replaced independently. In this paper AJAX enabled web application model with comet programming is introduced and tested. Two approaches for long polling are considered namely, using UpdatePanel and using JSON. The experimental results are compared using Firebug tool provided by Mozilla Firefox.
In last decade, there have been enormous changes in the field of web applications. The phase has ... more In last decade, there have been enormous changes in the field of web applications. The phase has shifted from static to dynamic, and fixed layout has now taken the form of responsive layout, due to distribution of processing capabilities from server side to client side, mainly because of rich set of scripts for user interface and making request to server. This leads to reduction in network traffic. This is on the presumption of trustiness on client, eventually creating a web application more vulnerable. This paper will cover importance of each triad of web, mainly security with its service points. This will facilitate a developer to identify which service point is more important with respect to application requirements. It will also apply sufficient security checks at service point in each component of the application.
Malware is not defined in single word. It is collection of malicious code or instructions which s... more Malware is not defined in single word. It is collection of malicious code or instructions which spread through the connected system or internet. It’s using for gain illegally economic benefits and to damage other computer or network system. Malware detection is an important role in the cyber security. At present some anti malware software are used to detect malware, these are signature-based methods who cannot provide accurate result of malware attacks. Many metamorphic and polymorphic techniques are used to conceal the behavior of malicious program. These are the serious challenges to global security threat. Presently various malware detection techniques are available such as Heuristic based, Signature based and behavior based techniques. Most of the anti virus vendor uses signature based detection techniques, who already have known and well documented data base of signature value. Obfuscation and polymorphism technique impede the primary stage detection.
For any web application the connectivity with the server is always a crucial issue. Correctly acc... more For any web application the connectivity with the server is always a crucial issue. Correctly accessing the data and availability to user at the faster rate is the major issue. In classical approach, stateless request and response make refreshing of complete page. The AJAX engine improves the situation from complete reference to server to need base access. Ajax can help in making a new model, in which the single-page web interface is composed of individual components that can be updated/ replaced independently. In this paper AJAX enabled web application model with comet programming is introduced and tested. Two approaches for long polling are considered namely, using UpdatePanel and using JSON. The experimental results are compared using Firebug tool provided by Mozilla Firefox.
Information Retrieval deals with the representation, storage, organization of, and access to info... more Information Retrieval deals with the representation, storage, organization of, and access to information items. The representation and organization of information items should provide the user with easy access to the information with the rapid development of Internet, large amounts of digitally stored information is readily available on the World Wide Web. This information is so huge that it becomes increasingly difficult and time consuming for the users to find the information relevant to their needs. The explosive growth of information on the Internet has greatly increased the need for information retrieval systems. However, most of the search engines are using conventional information retrieval systems. An information system needs to implement sophisticated pattern matching tools to determine contents at a faster rate. AJAX has recently emerged as the new tool such the of information retrieval process of information retrieval can become fast and information reaches the use at a faster pace as compared to conventional retrieval systems.
Web applications are becoming a requisite mediator to provide access to the various on-line dynam... more Web applications are becoming a requisite mediator to provide access to the various on-line dynamic web services. As more features add to making interactive and efficient web applications, attackers get more options to bypass those vulnerabilities. According to OWASP Community, the number of web attacks is increasing drastically since last few years. Cross Site Scripting (XSS) is one of the vulnerabilities commonly found on websites which affects both the client and server as well. These types of attack usually take place due to vulnerabilities of User Interface. This paper discusses why the Cross Site Scripting Attack is so threatening and what are the potential consecutions of such kind of attacks. Further, this article provides an approach to user input sanitization techniques to prevent critical XSS attacks.
Uploads
Papers by rajendra kachhwaha