{"title":"Services without Network Traffic","authors":"K. Sivaraman, G. Kavitha","doi":"10.29333/EJAC/2018255","DOIUrl":"https://doi.org/10.29333/EJAC/2018255","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"86 1","pages":"947-951"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82069633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Thota Shiva Sai Krishna, N. Priya, C. Dr.Rajabhushanam
: Security has been an essential issue within the style in readying of an enterprise network. A campus network is a very important part of campus life and network security is crucial for a campus network. Secured network protects an establishment from security attacks related to network. A university network includes a range of uses like teaching, learning, research, management, e-library, result publication. Network security can stop the university network from differing kinds of threats and attacks. The theoretical contribution of this study may be a reference model design of the university campus network that may be pre-designed or custom-made to make strong, however versatile network that the successive generation needs.
{"title":"Design and Implementation of a Secure Campus Network","authors":"Thota Shiva Sai Krishna, N. Priya, C. Dr.Rajabhushanam","doi":"10.29333/EJAC/2018238","DOIUrl":"https://doi.org/10.29333/EJAC/2018238","url":null,"abstract":": Security has been an essential issue within the style in readying of an enterprise network. A campus network is a very important part of campus life and network security is crucial for a campus network. Secured network protects an establishment from security attacks related to network. A university network includes a range of uses like teaching, learning, research, management, e-library, result publication. Network security can stop the university network from differing kinds of threats and attacks. The theoretical contribution of this study may be a reference model design of the university campus network that may be pre-designed or custom-made to make strong, however versatile network that the successive generation needs.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"61 1","pages":"845-852"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75024388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Methodology for the Understanding of Semaphores","authors":"C. Geetha, S. Amudha","doi":"10.29333/EJAC/2018235","DOIUrl":"https://doi.org/10.29333/EJAC/2018235","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"29 1","pages":"822-828"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82290646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Unique—Hadoop is an open Source programming stack for preparing unstructured and semi-organized information over the group of Commodity equipment. It is a dependable, adaptable and minimal effort answer for putting away and preparing immense measures of information in a conveyed frame. It is intended for preparing and taking care of extensive records and faces execution punishment while managing expansive number of little documents.
{"title":"Hand Loop Enforcement in Security Using Sensor","authors":"D. Jeyapriya, S. Theivasigamani","doi":"10.29333/EJAC/2018246","DOIUrl":"https://doi.org/10.29333/EJAC/2018246","url":null,"abstract":"Unique—Hadoop is an open Source programming stack for preparing unstructured and semi-organized information over the group of Commodity equipment. It is a dependable, adaptable and minimal effort answer for putting away and preparing immense measures of information in a conveyed frame. It is intended for preparing and taking care of extensive records and faces execution punishment while managing expansive number of little documents.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"3 1","pages":"903-907"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79141771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To ensure the actual presence of a real legitimate trait in contrast to a fake selfmanufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding likeness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-ofthe-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.
{"title":"Security of Biometric Recognition Frameworks is Enhanced by Image Quality Assessment","authors":"V. Singh, K. Subbulakshmi.","doi":"10.29333/EJAC/2018241","DOIUrl":"https://doi.org/10.29333/EJAC/2018241","url":null,"abstract":"To ensure the actual presence of a real legitimate trait in contrast to a fake selfmanufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding likeness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-ofthe-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"97 1","pages":"863-870"},"PeriodicalIF":0.0,"publicationDate":"2019-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76668312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Virtualization in Solaris with Shared Storage for High Availability","authors":"Dr.Khanna, R. Dr.Udayakumar","doi":"10.29333/EJAC/2018144","DOIUrl":"https://doi.org/10.29333/EJAC/2018144","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"31 1","pages":"771-778"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73344196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IOT (Internet of Things) is the network of physical gadgets, vehicles, buildings and different things implanted with hardware, software, sensors, and system network that empowers these objects to gather and exchange information. The internet of things enables items to be detected and controlled remotely crosswise over existing system framework. As per the Gartner, 260 million objects will be connected by year 2020. Several organizations and governments have attempted to make references with IoT in beginning circumstances, however these days in manufacturing, retail and SOC (Social Overhead Capital) enterprises, fruitful accepted procedures are built recently. In this paper we have discussed the security and privacy concerns of IOT. Security level at different layers of IOT architecture as well as importance of security in IOT is discussed. Challenges in obtaining secure IOT and the solution to them is also discussed.
{"title":"Analysis on the Security: Internet of Things","authors":"M. Ramamoorthy, N. Ayyanathan, M. PadmaUsha","doi":"10.29333/EJAC/2018154","DOIUrl":"https://doi.org/10.29333/EJAC/2018154","url":null,"abstract":"IOT (Internet of Things) is the network of physical gadgets, vehicles, buildings and different things implanted with hardware, software, sensors, and system network that empowers these objects to gather and exchange information. The internet of things enables items to be detected and controlled remotely crosswise over existing system framework. As per the Gartner, 260 million objects will be connected by year 2020. Several organizations and governments have attempted to make references with IoT in beginning circumstances, however these days in manufacturing, retail and SOC (Social Overhead Capital) enterprises, fruitful accepted procedures are built recently. In this paper we have discussed the security and privacy concerns of IOT. Security level at different layers of IOT architecture as well as importance of security in IOT is discussed. Challenges in obtaining secure IOT and the solution to them is also discussed.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"14 1","pages":"861-869"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75379759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Localization Method based Search for Wireless Sensor Network","authors":"R. MuthuVenkataKrishnan, R. Dr.Karthikeyan","doi":"10.29333/EJAC/2018156","DOIUrl":"https://doi.org/10.29333/EJAC/2018156","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"7 1","pages":"884-892"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81930819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Most Prominent Technique for Privacy Preservation in Mining Micro Data (NCCC-13)","authors":"Dr.Khanna, R. Dr.Udayakumar","doi":"10.29333/EJAC/2018148","DOIUrl":"https://doi.org/10.29333/EJAC/2018148","url":null,"abstract":"","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"39 1","pages":"807-815"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78305321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yoga is essentially a spiritual discipline based on an extremely subtle science, which focuses on bringing harmony between mind and body. It is an art and science of healthy living. It includes a group of physical, mental and spiritual practices which originated in ancient India. As per Yogic scriptures, the practice of Yoga leads to the union of individual consciousness with that of the Universal Consciousness, indicating a perfect harmony between the mind and body, Man & Nature. In this paper we focused the two disorders in our human body blood pressure and blood sugar are commonly prevalent world over. We studied and analysis of vedathiri maharishi exercises and mediation. And how, the yoga exercises and meditation are reducing the disorders. For that, we are taken 25 persons for experimented with Simplified physical activity, Nadi suddhi pranayama, and full meditation on breathing. It is shown conclusive evidence of improvement in blood pressure and blood sugar conditions.
{"title":"A Study and Analysis on Sky Yoga and Its Impact on Blood Sugar and Blood Pressure","authors":"C. Nalini, Kanchana","doi":"10.29333/EJAC/2018195","DOIUrl":"https://doi.org/10.29333/EJAC/2018195","url":null,"abstract":"Yoga is essentially a spiritual discipline based on an extremely subtle science, which focuses on bringing harmony between mind and body. It is an art and science of healthy living. It includes a group of physical, mental and spiritual practices which originated in ancient India. As per Yogic scriptures, the practice of Yoga leads to the union of individual consciousness with that of the Universal Consciousness, indicating a perfect harmony between the mind and body, Man & Nature. In this paper we focused the two disorders in our human body blood pressure and blood sugar are commonly prevalent world over. We studied and analysis of vedathiri maharishi exercises and mediation. And how, the yoga exercises and meditation are reducing the disorders. For that, we are taken 25 persons for experimented with Simplified physical activity, Nadi suddhi pranayama, and full meditation on breathing. It is shown conclusive evidence of improvement in blood pressure and blood sugar conditions.","PeriodicalId":11690,"journal":{"name":"Eurasian Journal of Analytical Chemistry","volume":"152 1","pages":"1178-1188"},"PeriodicalIF":0.0,"publicationDate":"2019-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86244874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}