Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking... more
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking organizations evolves and spreads with the introduction of enhanced communication technologies. Though, this novel business occasion for the provision of banking products and services increases the need for security, especially due to the sensitive nature of the information exchanged. The specific nature of Internet banking systems creates the necessity for focused facts on security issues to be able to successfully demeanor an assessment or security evaluation process. More specifically, the information systems (IS) auditor should have the necessary technical and operational skills and knowledge to carry out the review of the technology employed and risks associated with Internet banking. Following this requirement, this paper presents a novel authenticatio...
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives... more
In order to protect secret information from sensitive and various applications, secured authentication system should be incorporated; it should contain security and confidentiality. Even if it is assumed that the cryptographic primitives are perfect, the security goals may not be achieved: the system itself may have weaknesses that can be exploited by an attacker in network attacks. In this paper a Secured Authentication Protocol System using Images (SAPSI) is presented. It ensures confidentiality, and authentication using server and Image based authentication mechanism
Introduction Designing [1,3,12] flexible and dynamically configurable user interfaces is challenging. It is unlikely that developers will come up with a solution for all problems that is appropriate for all users. Users often like to... more
Introduction Designing [1,3,12] flexible and dynamically configurable user interfaces is challenging. It is unlikely that developers will come up with a solution for all problems that is appropriate for all users. Users often like to customise their interfaces, as evident from different preferences in office and desktop designs. The system should provide flexibility not only to the individuals but also across different groups. A groupware infrastructure is defined by three dimensions (usability 1 st (1999)): a) Communication (pushing or pulling information out into an organization, distributed environment, networking etc.), b) Collaboration (using shared information and building shared understanding), and c) Coordination (concurrency support and latecomer support). The development and maintenance of user interface software is challenging. The interface development environments provide facilities that allow individual components within an interface to be constructed without recourse ...
Clustering is the unsupervised classification of data items of patterns into groups, each of which should be as homogeneous as possible. The problem of clustering has been addressed in many contexts in many disciplines and this reflects... more
Clustering is the unsupervised classification of data items of patterns into groups, each of which should be as homogeneous as possible. The problem of clustering has been addressed in many contexts in many disciplines and this reflects its broad appeal and ...
... Walsh [7] (see also Savill[9]) investigated rxperimentMly the drag reduction that could bc expected on a flat plate and found it tt) be around 5 % for saw-tooth shal)cd riblcts of height half the logarithnfic boundary layer thickness... more
... Walsh [7] (see also Savill[9]) investigated rxperimentMly the drag reduction that could bc expected on a flat plate and found it tt) be around 5 % for saw-tooth shal)cd riblcts of height half the logarithnfic boundary layer thickness and ... ' = -trOy/On and so Front (18) we have va ...
Identification of user session boundaries is one of the most important processes in the web usage mining for predictive prefetching of user next request based on their navigation behavior. This paper presents new techniques to identify... more
Identification of user session boundaries is one of the most important processes in the web usage mining for predictive prefetching of user next request based on their navigation behavior. This paper presents new techniques to identify user session boundaries by considering IPaddress, browsing agent, intersession and intrasession timeouts, immediate link analysis between referred pages and backward reference analysis without searching
This paper presents a novel clustering algorithm based on harmony Search (HS) with features of Artificial Bee Colony (ABC) and K-means algorithms. Harmony search (HS) is a stochastic meta-heuristic optimization algorithm inspired from the... more
This paper presents a novel clustering algorithm based on harmony Search (HS) with features of Artificial Bee Colony (ABC) and K-means algorithms. Harmony search (HS) is a stochastic meta-heuristic optimization algorithm inspired from the improvisation process of musicians. However, HS fails to concentrate on the crucial factor of mutating the harmony vectors with better values in the improvisation step (where
With the huge amount of information available online, the World Wide Web is an important area for data mining research. The long-term success of the WWW depends on fast response time. The best solution towards the reduction of latency was... more
With the huge amount of information available online, the World Wide Web is an important area for data mining research. The long-term success of the WWW depends on fast response time. The best solution towards the reduction of latency was the caching and predictive prefetching of files that are likely to be requested soon, while the user is browsing through the currently displayed pages. In general web mining can be categorized into three areas of interest based on the part of the web to mine: Web content mining, Web structure mining, and web usage mining. In this paper, we focus on usage mining issues related with preprocessing and prefetching using server side web logs. First we analyzed the important preprocessing issue to make efficient use of available database for mining process where the mining process can be lengthy, aimless, and ineffective without it. In the second issue, the data structures hash tree and enumeration set used for Association rule mining is analyzed. We hav...
Research Interests:
Data Mining, also known as knowledge discovery in databases, has been recognized as a promising new area for database research. Mining frequent item sets in transactional databases, binary transaction tables, time series databases and... more
Data Mining, also known as knowledge discovery in databases, has been recognized as a promising new area for database research. Mining frequent item sets in transactional databases, binary transaction tables, time series databases and many other kinds of ...
... Kama raj University Madurai. prithivimohan@gmail.com Dr.G.Arumugam Professor and Head Department of Computer Science Madurai Kama raj University Madurai. gurusamyarumugam@gmail.com Abstract In the traditional ...
Optimal shapes of distributed systems can be obtained by the techniques of optimal control and numerical analysis. However these shapes are often unfeasible because they violate constraints which were not thought of at first. Thus optimal... more
Optimal shapes of distributed systems can be obtained by the techniques of optimal control and numerical analysis. However these shapes are often unfeasible because they violate constraints which were not thought of at first. Thus optimal design requires constant changes of criteria and constants functionals. In this paper we propose a few solutions to minimize code developments under such conditions.
Chaos functions are mainly used to develop mathematical models of non-linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability... more
Chaos functions are mainly used to develop mathematical models of non-linear systems. They have attracted the attention of many mathematicians owing to their extremely sensitive nature to initial conditions and their immense applicability to problems in daily life. In this paper, ...
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking... more
The stipulation of electronic services, such as Transactional, Non-transactional, Financial institution administration, Management of multiple users having varying levels of authority and Transaction approval process, by banking organizations evolves and spreads with the introduction of enhanced communication technologies. More specifically, the information systems (IS) auditor should have the necessary technical and operational skills and knowledge to carry out the review of the technology employed and risks associated with Internet banking, Financial services etc. Following this necessity an approach made by URL Analysis and Cross Site Scripting with Secured Authentication Protocol System in Financial Services [URL-SAP] is presented to provide security to the end users.
Research Interests: