Abstract—E-commerce applications are becoming popular day by day as they are working like a virtu... more Abstract—E-commerce applications are becoming popular day by day as they are working like a virtual shop. Writing good E-commerce application is tedious task and complex also. The applications if made complex are very difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the information at one click and with proper feedback. As these are web based applications efficiency matters a lot for this application. As transaction in e-commerce faces the problems such as database exploits, log data mining and sniffing attacks which can be resolved by using different security measure. Hence security is important in e-commerce application Keywords—Sniffing Attack, Log Data Mining, DBMS exploit Electronic commerce lets companies integrate internal and external business processes through information and communication technologies. Companies conduct these business processes over intranets, extranets, and the Internet. E-commerce lets businesses red...
Refactoring/restructuring is important part of maintenance activities which improves software qua... more Refactoring/restructuring is important part of maintenance activities which improves software quality. This paper focuses on various methods for restructuring for procedural languages, object oriented languages and web based applications. Restructuring activities are taken place in code to improve the quality of the software application.Repetative code components, frequent item sets, Long classes, God classes in the code are the main areas where restructuring can be applied. Different methods like extract method, rename method, move method, pull-up method are applied in different situations. These methods are used in combinations and conflicts should be avoided while applying the restructurings.
E-commerce applications are becoming popular day b y day as they are working like a virtual shop.... more E-commerce applications are becoming popular day b y day as they are working like a virtual shop. Writing good E-commerce application is tedious task and com plex also. The applications if made complex are ver y difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the informa tion at one click and with proper feedback. As these are web based applic ations efficiency matters a lot for this application. As transaction in e-commerce faces the problems such as database expl oits, log data mining and sniffing attacks which ca n be resolved by using different security measure. Hence security is important in e-commerce application Keywords—Sniffing Attack, Log Data Mining, DBMS exploit
Refactoring/restructuring is important part of maintenance activities which improves software qua... more Refactoring/restructuring is important part of maintenance activities which improves software quality. This paper focuses on various methods for restructuring for procedural languages, object oriented languages and web based applications. Restructuring activities are taken place in code to improve the quality of the software application.Repetative code components, frequent item sets, Long classes, God classes in the code are the main areas where restructuring can be applied. Different methods like extract method, rename method, move method, pull-up method are applied in different situations. These methods are used in combinations and conflicts should be avoided while applying the restructurings.
International Journal of Advanced Research in Computer Science, 2012
Intrusion detection is an important component in network security. Many current Intrusion Detecti... more Intrusion detection is an important component in network security. Many current Intrusion Detection Systems are designed on rule-based, which have a limitation of identifying the unknown attacks. Some IDS are designed on anomaly based detection technique which have advantage of identifying known and unknown attacks. It has a disadvantage of learning and training the data set to identify the good and bad data. Some IDS are designed on both signature based and anomaly based detection techniques. That are also referred to as hybrid IDS systems. There are many IDS available in which some IDS are open source IDS and some IDS are commercial products used in enterprise network. This paper gives the detailed comparative study of open source software SNORT, BRO, Net STAT also covers the commercial products like NFR, Emerald which is used as research tool and SAX2. Keywords: signature based system, anomaly detection system, Intrusion Detection system
This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attac... more This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attacks and the scenario of how DoS attacks can happen on internet its defence mechanisms. There are many solutions proposed by many author to avoid DoS and DDoS attacks and that are discussed in this paper. This paper provides classification of attacks, and the defence mechanisms that can be used to detect the DDoS and DoS attack.
Web project management is about using web services that are geographically distributed, where pro... more Web project management is about using web services that are geographically distributed, where project managers and team members are located in different cities, states and countries. It plays an important role in any organization for saving money and utilizing time efficiently. The project goals must be followed in terms of costs, time, scope, risk, effort and quality. Also, Modern software development, with an emphasis on web and distributed development, with limited face-to-face interaction among team members presents specific challenges and risk areas to the software industry which need to be considered and managed. On this background, this paper focuses on tying different web project estimation methods, with different risks involved and risk resolution techniques into an integrative framework for managing risks in distributed contexts. We can also combine these methods to minimize the impact of risk involved.
Extensive use of images in various applications gives immense importance to Content based image r... more Extensive use of images in various applications gives immense importance to Content based image retrieval. There are many ways to retrieve image from image database depending upon various image features like DCT coefficients, mean, median entropy etc. Histogram [6] is very simple and old approach for image retrieval. This paper describes a combined approach to content based image retrieval considering DCT- coefficients of R,G,B planes separately and basic image features. The idea in this study to evaluate the effect of above image features to query image. Again the comparison of Database image and query image is done on the basic of similarity measures such as Euclidian distance in above specified methods. Finally a threshold is obtained based on sample basis. We applied our approach to a database of 25 JPG images which includes 10 dinosaurs and 10 flowers. We have determined the capability of automatic indexing by analyzing image contents as features. The results are far more accur...
Writing is a mode of coherent communication which can effectively convey our thoughts. Today, typ... more Writing is a mode of coherent communication which can effectively convey our thoughts. Today, typing and writing are the usual modes of recording information. Another technique that is rapidly gaining popularity is air-writing. It refers to writing characters or words in free space using an air-pen or a finger. It differs from conventional writing methods as there is no pen-up and pen-down motion. With the evolution of smart wearables, the digital world can now be controlled with human gestures. These wearables are capable of perceiving and comprehending our actions. Our project capitalizes on this need gap, by focusing on creating a motion-to-text converter that would potentially act as software for the smart wearables for air-writing. This project is a point gesture detector-cum-identifier. We will use computer vision to trace the trajectory of finger and machine learning to recognize the word (out of the image that is formed through the action of motions). This will make air-writ...
Personality analysis is an intuitive ability of humans, carried out every day with multiple peopl... more Personality analysis is an intuitive ability of humans, carried out every day with multiple people, and for innumerable reasons. Personality profiling, specifically, has several real-life applications, such as mental health screening tests, screening during human resource interviews, etc. Hiring candidates is one of the most crucial and time-consuming processes for any company. Personality Analysis using social media is an actively developing field. It will help in the job hiring process to get an overall idea of the candidate's ideas and ideals, providing a consistent and fair ranking policy. This system aims to automate the personality assessment process by analyzing the text extracted from his/her tweets, and suggests general job roles suitable for the candidates. The models used for personality analysis are Myers Briggs Type Indicator (MBTI) personality analysis and Big Five personality analysis. The employer from the hiring company will be shown a metric of the applied cand...
Using cloud computing, users store their data remotely to third party owners and enjoy the on-dem... more Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.
E-commerce applications are becoming popular day by day as they are working like a virtual shop. ... more E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today's distributed ecommerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side ...
E-commerce applications are becoming popular day by day as they are working like a virtual shop. ... more E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The combination of these technologies creates a system that requires attention to the security issues of each component and the system as a whole. Hence security related to authentication, authorization and transaction database need to be managed carefully.
Abstract—E-commerce applications are becoming popular day by day as they are working like a virtu... more Abstract—E-commerce applications are becoming popular day by day as they are working like a virtual shop. Writing good E-commerce application is tedious task and complex also. The applications if made complex are very difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the information at one click and with proper feedback. As these are web based applications efficiency matters a lot for this application. As transaction in e-commerce faces the problems such as database exploits, log data mining and sniffing attacks which can be resolved by using different security measure. Hence security is important in e-commerce application Keywords—Sniffing Attack, Log Data Mining, DBMS exploit Electronic commerce lets companies integrate internal and external business processes through information and communication technologies. Companies conduct these business processes over intranets, extranets, and the Internet. E-commerce lets businesses red...
Refactoring/restructuring is important part of maintenance activities which improves software qua... more Refactoring/restructuring is important part of maintenance activities which improves software quality. This paper focuses on various methods for restructuring for procedural languages, object oriented languages and web based applications. Restructuring activities are taken place in code to improve the quality of the software application.Repetative code components, frequent item sets, Long classes, God classes in the code are the main areas where restructuring can be applied. Different methods like extract method, rename method, move method, pull-up method are applied in different situations. These methods are used in combinations and conflicts should be avoided while applying the restructurings.
E-commerce applications are becoming popular day b y day as they are working like a virtual shop.... more E-commerce applications are becoming popular day b y day as they are working like a virtual shop. Writing good E-commerce application is tedious task and com plex also. The applications if made complex are ver y difficult to maintain. Usability is a very basic concept in the E-commerce application. User has to get the informa tion at one click and with proper feedback. As these are web based applic ations efficiency matters a lot for this application. As transaction in e-commerce faces the problems such as database expl oits, log data mining and sniffing attacks which ca n be resolved by using different security measure. Hence security is important in e-commerce application Keywords—Sniffing Attack, Log Data Mining, DBMS exploit
Refactoring/restructuring is important part of maintenance activities which improves software qua... more Refactoring/restructuring is important part of maintenance activities which improves software quality. This paper focuses on various methods for restructuring for procedural languages, object oriented languages and web based applications. Restructuring activities are taken place in code to improve the quality of the software application.Repetative code components, frequent item sets, Long classes, God classes in the code are the main areas where restructuring can be applied. Different methods like extract method, rename method, move method, pull-up method are applied in different situations. These methods are used in combinations and conflicts should be avoided while applying the restructurings.
International Journal of Advanced Research in Computer Science, 2012
Intrusion detection is an important component in network security. Many current Intrusion Detecti... more Intrusion detection is an important component in network security. Many current Intrusion Detection Systems are designed on rule-based, which have a limitation of identifying the unknown attacks. Some IDS are designed on anomaly based detection technique which have advantage of identifying known and unknown attacks. It has a disadvantage of learning and training the data set to identify the good and bad data. Some IDS are designed on both signature based and anomaly based detection techniques. That are also referred to as hybrid IDS systems. There are many IDS available in which some IDS are open source IDS and some IDS are commercial products used in enterprise network. This paper gives the detailed comparative study of open source software SNORT, BRO, Net STAT also covers the commercial products like NFR, Emerald which is used as research tool and SAX2. Keywords: signature based system, anomaly detection system, Intrusion Detection system
This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attac... more This paper gives the idea of Vulnerabilities present in protocols, Also detail study of DoS attacks and the scenario of how DoS attacks can happen on internet its defence mechanisms. There are many solutions proposed by many author to avoid DoS and DDoS attacks and that are discussed in this paper. This paper provides classification of attacks, and the defence mechanisms that can be used to detect the DDoS and DoS attack.
Web project management is about using web services that are geographically distributed, where pro... more Web project management is about using web services that are geographically distributed, where project managers and team members are located in different cities, states and countries. It plays an important role in any organization for saving money and utilizing time efficiently. The project goals must be followed in terms of costs, time, scope, risk, effort and quality. Also, Modern software development, with an emphasis on web and distributed development, with limited face-to-face interaction among team members presents specific challenges and risk areas to the software industry which need to be considered and managed. On this background, this paper focuses on tying different web project estimation methods, with different risks involved and risk resolution techniques into an integrative framework for managing risks in distributed contexts. We can also combine these methods to minimize the impact of risk involved.
Extensive use of images in various applications gives immense importance to Content based image r... more Extensive use of images in various applications gives immense importance to Content based image retrieval. There are many ways to retrieve image from image database depending upon various image features like DCT coefficients, mean, median entropy etc. Histogram [6] is very simple and old approach for image retrieval. This paper describes a combined approach to content based image retrieval considering DCT- coefficients of R,G,B planes separately and basic image features. The idea in this study to evaluate the effect of above image features to query image. Again the comparison of Database image and query image is done on the basic of similarity measures such as Euclidian distance in above specified methods. Finally a threshold is obtained based on sample basis. We applied our approach to a database of 25 JPG images which includes 10 dinosaurs and 10 flowers. We have determined the capability of automatic indexing by analyzing image contents as features. The results are far more accur...
Writing is a mode of coherent communication which can effectively convey our thoughts. Today, typ... more Writing is a mode of coherent communication which can effectively convey our thoughts. Today, typing and writing are the usual modes of recording information. Another technique that is rapidly gaining popularity is air-writing. It refers to writing characters or words in free space using an air-pen or a finger. It differs from conventional writing methods as there is no pen-up and pen-down motion. With the evolution of smart wearables, the digital world can now be controlled with human gestures. These wearables are capable of perceiving and comprehending our actions. Our project capitalizes on this need gap, by focusing on creating a motion-to-text converter that would potentially act as software for the smart wearables for air-writing. This project is a point gesture detector-cum-identifier. We will use computer vision to trace the trajectory of finger and machine learning to recognize the word (out of the image that is formed through the action of motions). This will make air-writ...
Personality analysis is an intuitive ability of humans, carried out every day with multiple peopl... more Personality analysis is an intuitive ability of humans, carried out every day with multiple people, and for innumerable reasons. Personality profiling, specifically, has several real-life applications, such as mental health screening tests, screening during human resource interviews, etc. Hiring candidates is one of the most crucial and time-consuming processes for any company. Personality Analysis using social media is an actively developing field. It will help in the job hiring process to get an overall idea of the candidate's ideas and ideals, providing a consistent and fair ranking policy. This system aims to automate the personality assessment process by analyzing the text extracted from his/her tweets, and suggests general job roles suitable for the candidates. The models used for personality analysis are Myers Briggs Type Indicator (MBTI) personality analysis and Big Five personality analysis. The employer from the hiring company will be shown a metric of the applied cand...
Using cloud computing, users store their data remotely to third party owners and enjoy the on-dem... more Using cloud computing, users store their data remotely to third party owners and enjoy the on-demand applications, services and storage from a shared pool of configurable computing resources, without the burden of data storage and maintenance and costs. However, we must provide security guarantees not only on authentication but also on files over the cloud for the outsourced data, which is now maintained by third parties such as cloud providers. This research focuses on mechanism, the hybrid of AES and Blowfish for encryption. For key management and key exchange, Key is generated by the ECC key generator and then Key agreement can be done by Diffie-Hellman. Combining the concept of ECC and DH is called Elliptic Curve Diffie-Hellman (ECDH) key exchange. Authentication should be done by Using Elliptic Curve Digital Signature Algorithm (ECDSA). This provides security protection for outsourced data, while introducing only minimal performance and monetary cost overhead.
E-commerce applications are becoming popular day by day as they are working like a virtual shop. ... more E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today's distributed ecommerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side ...
E-commerce applications are becoming popular day by day as they are working like a virtual shop. ... more E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The combination of these technologies creates a system that requires attention to the security issues of each component and the system as a whole. Hence security related to authentication, authorization and transaction database need to be managed carefully.
Uploads
Papers by Pradnya Rane