The growing challenge of security in Nigeria is of concern to all and every effort must be employed to combat this challenge. Some of the pertinent questions raised in the paper are, Can our Information Technology skills & strategy guarantee internal security in Nigeria? Do the security agencies have proper Information Technology Infrastructure in place for the purpose of information gat...
Paper Information
Authors Adams, Oluwadamilola, Kemi
Read Journal Click Here
Read Paper Click Here
Page No. 7 to 14

Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficient Identity-Based Cryptosystems, as well as their implementation essentially determines the efficiency of cryptosystems. In this work, we propose an identity-based encryption based on Tate Pairing on an elliptic curve. The scheme was chosen ciphertext security in the random oracle model as...
Paper Information
Authors Ramesh Ch, K Venugopal Rao, D Vasumathi
Read Journal Click Here
Read Paper Click Here
Page No. 31 to 35

Decades onwards companies are creating massive data warehouses to store the collected resources. Even though the stored resources are available, only few companies have been able to know that the actual value stored in the database. Procedure used to extract those values is known as data mining. We use so-many technologies to apply this data-mining technique, artificial neural network(AN...
Paper Information
Authors D. Rajeswara Rao, Dr. JVR Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 23 to 30

The diagnosis of heart disease at the early time is important to save the life of people as it is absolutely annoying process which requires extent knowledge and rich experience. By and large the expectation of heart infections in conventional method for inspecting reports, for example, Electrocardiogram-ECG, Magnetic Resonance Imaging- MRI, Blood Pressure-BP, Stress tests by medicinal p...
Paper Information
Authors D. Rajeswara Rao, Dr. JVR Murthy
Read Journal Click Here
Read Paper Click Here
Page No. 11 to 16

Abstract: malicious software also known as malware are the critical security threat experienced by the current ear of internet and computer system users. The malwares can morph to access or control the system level operations in multiple dimensions. The traditional malware detection strategies detects by signatures, which are not capable to notify the unknown malwares. The machine learni...
Paper Information
Authors G. Bala Krishna, V. Radha, K. Venugopala Rao
Read Journal Click Here
Read Paper Click Here
Page No. 17 to 22

Tate Pairings on Elliptic curve Cryptography are important because they can be used to build efficient Identity-Based Cryptosystems, as well as their implementation essentially determines the efficiency of cryptosystems. In this work, we propose an identity-based encryption based on Tate Pairing on an elliptic curve. The scheme was chosen cipher text security in the random oracle model a...
Paper Information
Authors Ramesh Ch, K Venugopal Rao, D Vasumathi
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 5

This article is an overview of a current multimodal biometrics research based on fingerprint and palm-print. It explains the pervious study for each modal separately and its fusion technique with another biometric modal. The basic biometric system consists of four stages: firstly, the sensor which is used for enrolment & recognition the biometrics data. Secondly, the pre-processing stage...
Paper Information
Authors Mouad .M.H.Ali, A. T. Gaikwad
Read Journal Click Here
Read Paper Click Here
Page No. 13 to 26

e-mail
Published In: GJCST Part: A: Hardware & Computation Volume: 1 Issue: 1
A very high gain two stage CMOS operational amplifier has been presented. The proposed circuit is implemented in 180nm CMOS technology with a supply voltage of ±0.65V. The current source in the OPAMP is replaced by a square root based current generator which helps to reduce the impact of process variations on the circuit and low power consumption due to the operation of MOS in su...
Paper Information
Authors Suyog Dixit
Read Journal Click Here
Read Paper Click Here
Page No. 29 to 33

This paper assesses the performance of mobile messaging and VoIP connections. We compared the CPU requirements of WhatsApp and IMO under different scenarios. This analysis also enabled a comparison of the performance of these applications on two Android operating system (OS) versions: KitKat or Lollipop. Two models of smartphones were considered, viz. Galaxy Note 4 and Galaxy S4. The app...
Paper Information
Authors R.C. De Oliveira, H.M. De Oliveira, R.A. Ramalho, L.P.S. Viana
Read Journal Click Here
Read Paper Click Here
Page No. 1 to 6

In many study the data are taken different period of time and the information about them is gathered relating to an event of concern at different time periods. The data are taken different time period are correlated. Regression analysis based on the Generalized Estimating Equation (GEE) is an increasing important method of such data. The Generalized Estimating Equation is an important an...
Paper Information
Authors Md. Soyebur Rahman, Shayla Naznin, Gowranga Kumar Paul
Read Journal Click Here
Read Paper Click Here
Page No. 21 to 22