Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
: Blockchain technology is increasingly attracting young people because it is so well adapted to the digital age. A decentralised data management system is necessary for the blockchain idea in order to store and share data and... more
: Blockchain technology is increasingly attracting young people because it is so well adapted to the digital age. A decentralised data management system is necessary for the blockchain idea in order to store and share data and transactions throughout the network. This study investigates various types of risks associated with blockchain technology. The research covers different aspects of blockchain, including the architecture, consensus mechanism, smart contracts, and underlying cryptographic algorithms. It also examines the risks associated with the adoption and implementation of blockchain in various industries, such as finance, healthcare, and supply chain management. Moreover, this study identifies several types of risks, including technical risks, such as scalability, interoperability, and security, as well as non-technical risks, such as regulatory compliance, legal liability, and governance issues. This study also discusses the potential impact of these risks on blockchain-based systems and the strategies that can be used to mitigate them.
: The last several years have seen a significant increase in interest in big data across a range of scientific and engineering fields. Despite having several benefits and applications, big data still has some difficulties that must be... more
: The last several years have seen a significant increase in interest in big data across a range of scientific and engineering fields. Despite having several benefits and applications, big data still has some difficulties that must be overcome for a higher level of service, such as big data analytics, big data management, and big data privacy and security. Big data services and apps stand to greatly benefit from blockchain decentralisation and security features. In this article, we present an overview of blockchain for big data with an emphasis on current methods, possibilities, and upcoming trends. We begin by providing a succinct explanation of big data, blockchain, and the purpose of their integration. After that, we look at different types of blockchain assistance for big data, such as blockchain for security in big data collection, data privacy protection, storage, and collection. Next, we examine the latest work on the utilization of blockchain applications for big data across different industries, including smart grid apps and applications, smart city applications, and smart healthcare applications. A few illustrative blockchain-big data initiatives are given and discussed for a good understanding. Finally, difficulties and potential directions are examined to advance research in an exciting field.
Blockchain is a decentralized, digital, and consensus-based secure information storage system. This article gives an overview of how to use the blockchain to construct a secure and trustworthy electronic voting system. The main goal of... more
Blockchain is a decentralized, digital, and consensus-based secure information storage system. This article gives an overview of how to use the blockchain to construct a secure and trustworthy electronic voting system. The main goal of this paper is to investigate the most recent state of blockchain-based voting research while attempting to foresee the accompanying potential issues future developments. This paper's technique is as follows: a methodical approach to review and following an overview of the blockchain's core structure and properties in relation. We present a conceptual definition of e-voting. Desired e-voting application based on blockchain symmetrical improvements in asymmetrical cryptography are also important. We gathered and examined a number of research papers from scientific databases that advocated for the use of the blockchain architecture in voting systems. These articles suggested that blockchain-based voting systems may offer alternatives to standard ...
Day by day, the number of blog users and microblog users is increasing worldwide. It is easy to say that blogs have captured a significant portion of other web services. In the past few years, the number of users has exponentially... more
Day by day, the number of blog users and microblog users is increasing worldwide. It is easy to say that blogs have captured a significant portion of other web services. In the past few years, the number of users has exponentially increased. User count of Facebook, Twitter, and Instagram applications is not hidden from anyone. Users on such platforms share ideas, experiences, stories, opinions, and views and want to interact with people with the same set of interests. As per the user’s expectation, there is a requirement of two things: content curation and recommendations. The content curation algorithm will find the people and their posts on personalized search results. In addition, the recommendation system will help to find the most appropriate match to interact with. In this paper, both approaches are combined to show the user’s curated and recommended results. The article focuses on the hybrid model named S-ANFIS, and the results are compared with the well-known approaches like...
Matroids are the combinatorial structure and Greedy algorithmic methods always produces optimal solutions for these mathematical models. A greedy method always selects the option that looks best at each step of process of finding optimal... more
Matroids are the combinatorial structure and Greedy algorithmic methods always produces optimal solutions for these mathematical models. A greedy method always selects the option that looks best at each step of process of finding optimal solution. In other words, it selects a choice which is optimal choice locally in such a strategy that this locally chosen option may direct to a solution that will be globally optimal. It is true that while selecting locally optimal solution at each stage, Greedy algorithms may not always yield optimal solutions [1-2], but if we can transform an unknown problem into matroid structure, then there must be a greedy algorithm that will always lead optimal solution for that unknown problem. The range of solutions provided by Greedy is large as compared to the applicability of the Matroid structure. In other words the problems that can be translated into Matroid structure is proper subset of set of all problems whether Greedy algorithm produces optimal so...
The paper states the approach of embedding text secret message into an JPEG image file by dividing the entire image into blocks of 4 pixels and finding the key position using the values of RGB from the first block and then arranging the... more
The paper states the approach of embedding text secret message into an JPEG image file by dividing the entire image into blocks of 4 pixels and finding the key position using the values of RGB from the first block and then arranging the entire blocks into array and selecting particular blocks randomly for embedding the secret message. The idea is to finding a random pattern that is not easy to recognize by an attacker and along with that spreading the secret message throughout the image to cause a smooth distribution that will not affect the image quality much with a high capacity for data embedding.
In today’s world information security is most essential but there will be a need for securing information that is extracted by the agent on the web. In this paper, we will discuss security of agents on the Semantic We. Agents play... more
In today’s world information security is most essential but there will be a need for securing information that is extracted by the agent on the web. In this paper, we will discuss security of agents on the Semantic We. Agents play different roles in different platforms dynamically changing access requirements, and users act on behalf of Use of various privileges. Agent in order to secure, we will propose a method that dynamic agent SAML authentication and authorization using them to exchange information.
Blockchain technology as an infrastructure allows an innovational platform for a new transparent and decentralized transaction mechanism for different type of industries and businesses. Different attributes of blockchain technology... more
Blockchain technology as an infrastructure allows an innovational platform for a new transparent and decentralized transaction mechanism for different type of industries and businesses. Different attributes of blockchain technology increase trust through traceability and transparency ability of goods, data and financial resources within any transaction. Regardless of initial uncertainty about this technology, government and many major enterprises and firms have recently examined the adoption and improvement of this technology in several areas of applications, from social, legal and finance industries to manufacturing, design and supply-chain networks. An interesting research problem in this new era is that of determining provenance. At present, goods which are produced and transported using complicated medium supply chains, in this type of supply chain it is impossible to evaluate the provenance of physical goods. We have an interest in the blockchain as there are numerous favored u...
Cardiovascular disease is one of the focused areas is medical area because its origins sickness and death amongst the population of the entire world. Data mining techniques play an important role to convert the large amount of raw data... more
Cardiovascular disease is one of the focused areas is medical area because its origins sickness and death amongst the population of the entire world. Data mining techniques play an important role to convert the large amount of raw data into meaningful information which will help in prediction and decision of Cardiovascular disease. The prediction models were technologically advanced using diverse amalgamation structures and sorting techniques such as k-NN, Naive Bayes, LR, SVM, Neural Network, Decision Tree. It is very necessary for the recital of the prediction models to choose the exact amalgamation of momentous features. The main Aim of the propose System is to develop an develop an Intelligent System using data mining modeling technique. The proposed system retrieves the data set and compare the data set with the predefined trained data set. The existing decision support system cannot predict the complex question for diagnosing the heart disease but the proposed system predicts ...
Cloud Computing is widespread to support industrial and academy related applications worldwide. Management of workloads to meet all the resource allocation issues, due to the participation of huge number of users is majorly studied in... more
Cloud Computing is widespread to support industrial and academy related applications worldwide. Management of workloads to meet all the resource allocation issues, due to the participation of huge number of users is majorly studied in previous research works. Enterprises, search organization, government department and universities are planning to move on cloud computing spreads globally and many organizations now see the cloud as being an extension of IT resources. It becomes very demanding for a web application to manage large number of users, who accesses the particular web application at one time, that’s why Load Balancer come into the picture. In this paper we survey the comparison and contrast of various loads balancing policy
Cloud computing is a technology in the field of computing which offer services to the customer from anywhere at any time [1]. In the cloud, resources are shared all around the work for quick servicing to the customer. The aggregation of... more
Cloud computing is a technology in the field of computing which offer services to the customer from anywhere at any time [1]. In the cloud, resources are shared all around the work for quick servicing to the customer. The aggregation of two terms is referred as cloud computing. The term “cloud” is a pool of different resources offers services to the end customers and “computing” is done based on the Service Level Agreement (SLA) to make the resources efficiently to the customers. Load balancing is an important challenge in the environment of the cloud to increase the utilization of resources [3]. Here we proposed an algorithm which is based on load balancing and service broker policy. We user two representative thin the proposed approach local representative and global representative Local user representative is used to predict the parameters of user task and based on priority it allocate the task to the Virtual Machine (VM). Then for scheduling the task and provide the services to ...