Sharbani Bhattacharya | Iec College Of Engineering And Technology (original) (raw)

Papers by Sharbani Bhattacharya

Research paper thumbnail of Survey on Digital Watermarking – A Digital Forensics & Security Application

This article presents an overview of various watermarking types and techniques. This is a survey ... more This article presents an overview of various watermarking types and techniques. This is a survey paper which categories watermarking methods into seven parts. Watermarking method depends upon visibility, document type, robustness , watermarking application areas, various techniques of watermarking, availability of original image for extraction of watermarks and after extraction of watermark. The paper focus on watermarking as digital forensics and security application. Keywords— Watermarking, Visibility, Digital Forensics , Security, Robustness.

Research paper thumbnail of Additive Watermarking in Optimized Digital Image

Watermarking is a method which is used to identify and authenticate the originality of an image. ... more Watermarking is a method which is used to identify and authenticate the originality of an image. It is used in security and forensic too. In an image there can be a hidden or non-hidden text, image, information or a piece of program embedded, which restricts its unwanted usage. Watermarking are in pictures, images, logo, signature etc. In this paper, we describe a watermarking process by adding an image or text or piece of program to an optimized base image i.e. logo or signature. The procedure can be used for both visible and hidden watermark. Index Terms-Additive Watermarking, optimized image, covert image.

Research paper thumbnail of Steganalysis-Detection of Information Using Colormap

Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innoc... more Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innocent looking system. Example shows how invisible ink is used to pass a message in text explaining some important information. Steganalysis is art of detecting stego object from the covered object. There are various ways and means to detect stego image. Here, we are using a methodology to detect the hidden information which is stored in the color of image.

Research paper thumbnail of Watermarking Digital Images Using hash code and λ - Cut of Fuzzy Set

ABSTRACT Watermarking in digital images is for authentication and restricting it for unauthorized... more ABSTRACT Watermarking in digital images is for authentication and restricting it for unauthorized usages. Videos and other digital contents are used often by unauthorized users. The se are used as public - private key for encryption and then embedding the watermark in digital images. For embedding watermark fuzzy matrices composition s of the two fuzzy matrices and its Fuzzy Neighbourhood Sets are used. There is further work done on emb edding a hash code in digital image. The hash function generates hash code and hash fi le of text file using λ cut fuzzy set for embedding watermark.

Research paper thumbnail of Innovation Projects –Are key factors for the organization to sustain in market

ABSTRACT Typical reasons for innovating is to responding to customers need to enhance business, i... more ABSTRACT Typical reasons for innovating is to responding to customers need to enhance business, increasing market share, being at the forefront of industry, establishing a new market, improving the quality and speed of service, expanding the product range , meeting government standards/regulations, reducing costs and increasing revenues. Though, Archstone consulting report on its finding in a recent survey on innovation sets that over 70% of the firms they talked to were planning to increase investment in innovation, yet 50% were dissatisfied with the results of the their innovation initiatives to date. Only 5% claimed to have a “highly effective innovation process”. The reasons may be lying somewhere here that innovation projects often involve making hundreds of discussions, a process that can be fraught with hazards and conflicts …. unless well developed set of criteria for the project has been developed in advance.”Innovate or Die”- this mantra has been repeated so many times by the media , governments, business leaders, business professors, consultants and management gurus. Innovation through corporate alliances/ joint venture, merger and acquisitions are leading to faster growth , increased in market share and better corporate positioning. Innovation has increased employee motivation and morale with effective company’s profit margin. Innovation projects are bridging the gap between R&D, Academics, Industries and Customers. No innovation project lead to - sales drop , revenue drop, customer stop buying products, processes and services, shareholder return drop, stock prices drop and key employees leave. Technology is changing fast, new products come from new competitors. As the environment is changing fast product lifetime is shorter and needs to be replaced by enhanced and superior product. Customer have more choices , are more sophisticated, segmented and demanding. They expect more in terms of customization, newness, quality and prices. As knowledge management and various tools of Information System are readily available goods ideas are quickly copied therefore continual pressure to device new and better products process and services are necessary for sustaining in the market for organization.

Research paper thumbnail of E-learning is an Add-on in Classroom Teaching Pedagogy

ABSTRACT E-learning or electronic-learning methodology has taken up a huge leap in the recent dec... more ABSTRACT E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Though, e-learning is a sort of distance learning was there in last decade or prior to it. But the effective step are taken by many large companies to equip it in better way. There are various ways of e-learning. The companies or universities provide a platform to educate people to earn the online degree courses like Masters of Business Administration , Information Technology courses, short term courses, professional courses. As University of Phoenix has 25000 students doing various online courses. Apollo group , University of Phoenix based company who conducted various courses have a spin off of $ 2.4 billion in year 2008 from online courses. Association of Theological schools are developing standards for accrediting distance learning programs. Companies also have e-learning courses running for benefits of their employees. Some of the companies use it as platform to inform their employees about the companies profile , vision and working methodology. Getting balance sheet of the company to employee via e-learning process. Some, company train their new employees via e-learning modules like TCS, Infosys and etc. Mostly , big companies used e-learning as, well accessed easily given platform for learning to reduce cost of training and globally accessible quality information without timing constraints(anytime anywhere accessible). In today’s scenario, being in teaching in engineering college , I require many information given to the students repeatedly for various reasons like student being absent or changes in prior assignments or variation in tutorials for changes in pattern in syllabus or etc. Thus, a site is maintained , in order to give various learning tools, name of websites, books, materials, presentations to be downloaded. My activities in college like conducting workshop for students, IEEE or any professional society meets, selection of students for some industrial training is greeted in the website by students. As e-assignments are also an initiative for students for various situation. There are various methodologies and tools available like rapid learning / power point conversion, learning management system, virtual classroom/webcasting ,application simulation tools, electronic performance support system/ knowledge management system and podcasting. There are four stages of e-learning – start off, extension, integrate and adjust and on-demand. These four stages is covered in the e-learning by the site for the students. It is an added aid after the classroom teaching . It is thus an effective way of interaction in teaching. It is thus an effective way of interaction with the students after the schedule period of class. Student can access anytime, anywhere and many times.

Research paper thumbnail of Watermarking Digital Images Using Fuzzy Matrix Rules and Neighborhood Set

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking is sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public-private key and then embedded in the digital image as invisible watermark. In this paper we proposed four fuzzy matrix compositions Mod-Minus-Product, Compliment-Mod-Minus-Product, Compliment-Min-Max and Compliment-Min-Product. These are used as publicprivate key for encryption and then embedding the watermark in digital images. For embedding fuzzy matrices composition of the two fuzzy matrices and its neighbourhood sets are used.

Research paper thumbnail of Innovation Projects –Are key factors for the organization to sustain in market

Typical reasons for innovating is to responding to customers need to enhance business, increasing... more Typical reasons for innovating is to responding to customers need to enhance business, increasing market share, being at the forefront of industry, establishing a new market, improving the quality and speed of service, expanding the product range , meeting government standards/regulations, reducing costs and increasing revenues. Though, Archstone consulting report on its finding in a recent survey on innovation sets that over 70% of the firms they talked to were planning to increase investment in innovation, yet 50% were dissatisfied with the results of the their innovation initiatives to date. Only 5% claimed to have a “highly effective innovation process”. The reasons may be lying somewhere here that innovation projects often involve making hundreds of discussions, a process that can be fraught with hazards and conflicts …. unless well developed set of criteria for the project has been developed in advance.”Innovate or Die”- this mantra has been repeated so many times by the media...

Research paper thumbnail of E-learning is an Add-on in Classroom Teaching Pedagogy

E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Thou... more E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Though, e-learning is a sort of distance learning was there in last decade or prior to it. But the effective step are taken by many large companies to equip it in better way. There are various ways of e-learning. The companies or universities provide a platform to educate people to earn the online degree courses like Masters of Business Administration , Information Technology courses, short term courses, professional courses. As University of Phoenix has 25000 students doing various online courses. Apollo group , University of Phoenix based company who conducted various courses have a spin off of $ 2.4 billion in year 2008 from online courses. Association of Theological schools are developing standards for accrediting distance learning programs. Companies also have e-learning courses running for benefits of their employees. Some of the companies use it as platform to inform their employees a...

Research paper thumbnail of Database of e-learning in Cloud Computing

In database management system various steps of enhancement occured from the era of COBOL, FOXPRO ... more In database management system various steps of enhancement occured from the era of COBOL, FOXPRO to ORACLE 11g, SYBASE and INFORMIX. Cloud computing is the next challenging task for database management community. As said by James L. Johnson in SQL in Clouds “The distinguished features of a cloud computing environment are a large collection of inexpensive, off –the-shelf commodity processors and a generic interconnection network”. The database management with reliability, scalability, data security , redundancy and concurrency control are featured in cloud computing. Cloud offers cost saving by expanding and contracting business application as and when required. In clouds virtualization and grid computing allow applications to be dynamically deploy most suitable infrastructure at runtime. The concept of public, private and hybrid cloud gives more flexibility to the user to manage their cost and compliance with reasonable benefits and budget. Thus, using clouds in e-Learning processes...

Research paper thumbnail of Enterprise Information Integration- A designer tool collection for Information Management

EII is a process of information integration, using data abstraction to provide a single interface... more EII is a process of information integration, using data abstraction to provide a single interface (known as uniform data access) for viewing all the data within an organization, and a single set of structures and naming conventions (known as uniform information representation) to represent this data; the goal of EII is to get a large set of heterogeneous data sources to appear to a user or system as a single, homogeneous data source. Standardized data access APIs have emerged, that offer a specific set of commands to retrieve and modify data from a generic data source. Many applications exist that implement these APIs' commands across various data sources, most notably relational databases. Such APIs include ODBC, JDBC, OLE DB, and more recently ADO.NET. There are also standard formats for representing data within a file, that are very important to information integration. The best-known of these is XML, which has emerged as a standard universal representation format. There are ...

Research paper thumbnail of Encrypting Watermark by Fuzzy Max-Min Matrix

Digital images are used in the digital media for various purpose. These are required to be authen... more Digital images are used in the digital media for various purpose. These are required to be authenticated at some level to restrict its unauthorized usages. In order, to retain the copyright and authorization watermarking is useful concept. Watermarking are sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image is invisible watermarking. In this paper we will discuss encryption by fuzzy max-min matrix public- private key and embedding in digital image.

Research paper thumbnail of Survey on Digital Watermarking- A Digital Forensics & Security Application

This article presents an overview of various watermarking types and techniques. This is a survey ... more This article presents an overview of various watermarking types and techniques. This is a survey paper which categories watermarking methods into seven parts. Watermarking method depends upon visibility, document type, robustness , watermarking application areas, various techniques of watermarking, availability of original image for extraction of watermarks and after extraction of watermark. The paper foc us on watermarking as digital forensics and security application

Research paper thumbnail of Watermarking Digital Images Using hash code and λ - Cut of Fuzzy Set

Watermarking in digital images is for authentication and restricting it for unauthorized usages. ... more Watermarking in digital images is for authentication and restricting it for unauthorized usages. Videos and other digital contents are used often by unauthorized users. The se are used as public - private key for encryption and then embedding the watermark in digital images. For embedding watermark fuzzy matrices composition s of the two fuzzy matrices and its Fuzzy Neighbourhood Sets are used. There is further work done on emb edding a hash code in digital image. The hash function generates hash code and hash fi le of text file using λ cut fuzzy set for embedding watermark.

Research paper thumbnail of Steganalysis-Detection of Information Using Colormap

Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innoc... more Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innocent looking system. Example shows how invisible ink is used to pass a message in text explaining some important information. Steganalysis is art of detecting stego object from the covered object. There are various ways and means to detect stego image. Here, we are using a methodology to detect the hidden information which is stored in the color of image.

Research paper thumbnail of Developing Optimized Technique for Organization of Record in Files in Database System of Durgapur Cement Works, Durgapur

This work is related to the problem encountered during routine work in database Durgapur Cement W... more This work is related to the problem encountered during routine work in database Durgapur Cement Works, Durgapur, Unit of Birla Corporation Ltd. , Kolkata specially with Oracle database. Apart from Oracle database, it can be also extended in generalized form in other System with respective modifications and cooperating with other complexities of the systems. This work is only for Oracle database where certain type of organization technique is built-in. The Information System Department was consisting of oracle as ERP system in 2001. Now, in 2014 SAP is implemented and every administrative staff, engineers and personnel are having computers at their desk in DCW. Present book is based on my thesis of MS(Software Systems) from BITS Pilani year 2001 on Durgapur Cement Works, Unit Birla Corporation Ltd.

Research paper thumbnail of Watermarking Digital Image Using Fuzzy Matrix Rules

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking are sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image is invisible watermarking. In this paper we will discuss encryption by proposed fuzzy complimentary-sum-minus matrix is public- private key and then embedding the watermark in digital images using fuzzy matrices using suitable composition of the two fuzzy matrices which are used for encryption as public key and private key.

Research paper thumbnail of Data Security: An issue in cloud computing for e-Learning

E-Learning is an innovative teaching learning process which has taken hype nowadays. Increasing u... more E-Learning is an innovative teaching learning process which has taken hype nowadays. Increasing usages of internet for learning process is very productive. As Wikipedia and other web resources are vividly used in teaching. The e-learning S/Ws, websites and portals are very interactive. Using cloud computing for e-learning is another step forward to innovation. As cloud computing provides Infrastructure as a Service(IaaS), Platform as a Service(PaaS) and Software as a Service (SaaS). Thus, for e-learning ,sites are used as cloud computing e.g. Google App Engine, Yahoo Hadoop ,Webguru and many others. Faculties made their own sites for online tests, online filling forms for training programmes, assignments, tutorials, question banks, presentations, time-tables etc. Instead of having completely own infrastructure , it is rather easy to use Google App Engine, which provides facilities like site creating features, emailing system, calendar, spreadsheets and presentations with accessing u...

Research paper thumbnail of Watermarking Digital Images Using Fuzzy Matrix Rules and Neighborhood Set

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking is sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image as invisible watermark. In this paper we proposed four fuzzy matrix compositions Mod-Minus-Product, Compliment-Mod-Minus-Product, Compliment-Min-Max and Compliment-Min-Product. These are used as public- private key for encryption and then embedding the watermark in digital images. For embedding fuzzy matrices composition of the two fuzzy matrices and its neighbourhood sets are used.

Research paper thumbnail of Teaching & Learning Soft Computing using ICT

The Information and Communication Technology(ICT) has enhanced the teaching–learning process with... more The Information and Communication Technology(ICT) has enhanced the teaching–learning process with various innovative methods like e-learning, m-learning, smart boards, social networking sites, blogs, wiki, Youtube , Teacher tube, wireless classroom microphones, video-conferences, e-readers etc. ICT provide utilility tools, techniques to learn coursewares or learning material in multiple knowledge domain. It is used to design , develop, evaluate teaching resources efficiently. Learning goal is described as analysis of the subject matter and retention of information in memory. Learning goals include acquired knowledge converted to applicable skills. In this paper teaching and learning is enhanced by using interactive website in addition to classroom teaching. The goal of developing a website on courseware of Soft Computing of is to enhance teaching & learning process with interaction with student out of the class. This can be also aid for the student who have for some unavoidable reas...

Research paper thumbnail of Survey on Digital Watermarking – A Digital Forensics & Security Application

This article presents an overview of various watermarking types and techniques. This is a survey ... more This article presents an overview of various watermarking types and techniques. This is a survey paper which categories watermarking methods into seven parts. Watermarking method depends upon visibility, document type, robustness , watermarking application areas, various techniques of watermarking, availability of original image for extraction of watermarks and after extraction of watermark. The paper focus on watermarking as digital forensics and security application. Keywords— Watermarking, Visibility, Digital Forensics , Security, Robustness.

Research paper thumbnail of Additive Watermarking in Optimized Digital Image

Watermarking is a method which is used to identify and authenticate the originality of an image. ... more Watermarking is a method which is used to identify and authenticate the originality of an image. It is used in security and forensic too. In an image there can be a hidden or non-hidden text, image, information or a piece of program embedded, which restricts its unwanted usage. Watermarking are in pictures, images, logo, signature etc. In this paper, we describe a watermarking process by adding an image or text or piece of program to an optimized base image i.e. logo or signature. The procedure can be used for both visible and hidden watermark. Index Terms-Additive Watermarking, optimized image, covert image.

Research paper thumbnail of Steganalysis-Detection of Information Using Colormap

Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innoc... more Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innocent looking system. Example shows how invisible ink is used to pass a message in text explaining some important information. Steganalysis is art of detecting stego object from the covered object. There are various ways and means to detect stego image. Here, we are using a methodology to detect the hidden information which is stored in the color of image.

Research paper thumbnail of Watermarking Digital Images Using hash code and λ - Cut of Fuzzy Set

ABSTRACT Watermarking in digital images is for authentication and restricting it for unauthorized... more ABSTRACT Watermarking in digital images is for authentication and restricting it for unauthorized usages. Videos and other digital contents are used often by unauthorized users. The se are used as public - private key for encryption and then embedding the watermark in digital images. For embedding watermark fuzzy matrices composition s of the two fuzzy matrices and its Fuzzy Neighbourhood Sets are used. There is further work done on emb edding a hash code in digital image. The hash function generates hash code and hash fi le of text file using λ cut fuzzy set for embedding watermark.

Research paper thumbnail of Innovation Projects –Are key factors for the organization to sustain in market

ABSTRACT Typical reasons for innovating is to responding to customers need to enhance business, i... more ABSTRACT Typical reasons for innovating is to responding to customers need to enhance business, increasing market share, being at the forefront of industry, establishing a new market, improving the quality and speed of service, expanding the product range , meeting government standards/regulations, reducing costs and increasing revenues. Though, Archstone consulting report on its finding in a recent survey on innovation sets that over 70% of the firms they talked to were planning to increase investment in innovation, yet 50% were dissatisfied with the results of the their innovation initiatives to date. Only 5% claimed to have a “highly effective innovation process”. The reasons may be lying somewhere here that innovation projects often involve making hundreds of discussions, a process that can be fraught with hazards and conflicts …. unless well developed set of criteria for the project has been developed in advance.”Innovate or Die”- this mantra has been repeated so many times by the media , governments, business leaders, business professors, consultants and management gurus. Innovation through corporate alliances/ joint venture, merger and acquisitions are leading to faster growth , increased in market share and better corporate positioning. Innovation has increased employee motivation and morale with effective company’s profit margin. Innovation projects are bridging the gap between R&D, Academics, Industries and Customers. No innovation project lead to - sales drop , revenue drop, customer stop buying products, processes and services, shareholder return drop, stock prices drop and key employees leave. Technology is changing fast, new products come from new competitors. As the environment is changing fast product lifetime is shorter and needs to be replaced by enhanced and superior product. Customer have more choices , are more sophisticated, segmented and demanding. They expect more in terms of customization, newness, quality and prices. As knowledge management and various tools of Information System are readily available goods ideas are quickly copied therefore continual pressure to device new and better products process and services are necessary for sustaining in the market for organization.

Research paper thumbnail of E-learning is an Add-on in Classroom Teaching Pedagogy

ABSTRACT E-learning or electronic-learning methodology has taken up a huge leap in the recent dec... more ABSTRACT E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Though, e-learning is a sort of distance learning was there in last decade or prior to it. But the effective step are taken by many large companies to equip it in better way. There are various ways of e-learning. The companies or universities provide a platform to educate people to earn the online degree courses like Masters of Business Administration , Information Technology courses, short term courses, professional courses. As University of Phoenix has 25000 students doing various online courses. Apollo group , University of Phoenix based company who conducted various courses have a spin off of $ 2.4 billion in year 2008 from online courses. Association of Theological schools are developing standards for accrediting distance learning programs. Companies also have e-learning courses running for benefits of their employees. Some of the companies use it as platform to inform their employees about the companies profile , vision and working methodology. Getting balance sheet of the company to employee via e-learning process. Some, company train their new employees via e-learning modules like TCS, Infosys and etc. Mostly , big companies used e-learning as, well accessed easily given platform for learning to reduce cost of training and globally accessible quality information without timing constraints(anytime anywhere accessible). In today’s scenario, being in teaching in engineering college , I require many information given to the students repeatedly for various reasons like student being absent or changes in prior assignments or variation in tutorials for changes in pattern in syllabus or etc. Thus, a site is maintained , in order to give various learning tools, name of websites, books, materials, presentations to be downloaded. My activities in college like conducting workshop for students, IEEE or any professional society meets, selection of students for some industrial training is greeted in the website by students. As e-assignments are also an initiative for students for various situation. There are various methodologies and tools available like rapid learning / power point conversion, learning management system, virtual classroom/webcasting ,application simulation tools, electronic performance support system/ knowledge management system and podcasting. There are four stages of e-learning – start off, extension, integrate and adjust and on-demand. These four stages is covered in the e-learning by the site for the students. It is an added aid after the classroom teaching . It is thus an effective way of interaction in teaching. It is thus an effective way of interaction with the students after the schedule period of class. Student can access anytime, anywhere and many times.

Research paper thumbnail of Watermarking Digital Images Using Fuzzy Matrix Rules and Neighborhood Set

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking is sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public-private key and then embedded in the digital image as invisible watermark. In this paper we proposed four fuzzy matrix compositions Mod-Minus-Product, Compliment-Mod-Minus-Product, Compliment-Min-Max and Compliment-Min-Product. These are used as publicprivate key for encryption and then embedding the watermark in digital images. For embedding fuzzy matrices composition of the two fuzzy matrices and its neighbourhood sets are used.

Research paper thumbnail of Innovation Projects –Are key factors for the organization to sustain in market

Typical reasons for innovating is to responding to customers need to enhance business, increasing... more Typical reasons for innovating is to responding to customers need to enhance business, increasing market share, being at the forefront of industry, establishing a new market, improving the quality and speed of service, expanding the product range , meeting government standards/regulations, reducing costs and increasing revenues. Though, Archstone consulting report on its finding in a recent survey on innovation sets that over 70% of the firms they talked to were planning to increase investment in innovation, yet 50% were dissatisfied with the results of the their innovation initiatives to date. Only 5% claimed to have a “highly effective innovation process”. The reasons may be lying somewhere here that innovation projects often involve making hundreds of discussions, a process that can be fraught with hazards and conflicts …. unless well developed set of criteria for the project has been developed in advance.”Innovate or Die”- this mantra has been repeated so many times by the media...

Research paper thumbnail of E-learning is an Add-on in Classroom Teaching Pedagogy

E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Thou... more E-learning or electronic-learning methodology has taken up a huge leap in the recent decade. Though, e-learning is a sort of distance learning was there in last decade or prior to it. But the effective step are taken by many large companies to equip it in better way. There are various ways of e-learning. The companies or universities provide a platform to educate people to earn the online degree courses like Masters of Business Administration , Information Technology courses, short term courses, professional courses. As University of Phoenix has 25000 students doing various online courses. Apollo group , University of Phoenix based company who conducted various courses have a spin off of $ 2.4 billion in year 2008 from online courses. Association of Theological schools are developing standards for accrediting distance learning programs. Companies also have e-learning courses running for benefits of their employees. Some of the companies use it as platform to inform their employees a...

Research paper thumbnail of Database of e-learning in Cloud Computing

In database management system various steps of enhancement occured from the era of COBOL, FOXPRO ... more In database management system various steps of enhancement occured from the era of COBOL, FOXPRO to ORACLE 11g, SYBASE and INFORMIX. Cloud computing is the next challenging task for database management community. As said by James L. Johnson in SQL in Clouds “The distinguished features of a cloud computing environment are a large collection of inexpensive, off –the-shelf commodity processors and a generic interconnection network”. The database management with reliability, scalability, data security , redundancy and concurrency control are featured in cloud computing. Cloud offers cost saving by expanding and contracting business application as and when required. In clouds virtualization and grid computing allow applications to be dynamically deploy most suitable infrastructure at runtime. The concept of public, private and hybrid cloud gives more flexibility to the user to manage their cost and compliance with reasonable benefits and budget. Thus, using clouds in e-Learning processes...

Research paper thumbnail of Enterprise Information Integration- A designer tool collection for Information Management

EII is a process of information integration, using data abstraction to provide a single interface... more EII is a process of information integration, using data abstraction to provide a single interface (known as uniform data access) for viewing all the data within an organization, and a single set of structures and naming conventions (known as uniform information representation) to represent this data; the goal of EII is to get a large set of heterogeneous data sources to appear to a user or system as a single, homogeneous data source. Standardized data access APIs have emerged, that offer a specific set of commands to retrieve and modify data from a generic data source. Many applications exist that implement these APIs' commands across various data sources, most notably relational databases. Such APIs include ODBC, JDBC, OLE DB, and more recently ADO.NET. There are also standard formats for representing data within a file, that are very important to information integration. The best-known of these is XML, which has emerged as a standard universal representation format. There are ...

Research paper thumbnail of Encrypting Watermark by Fuzzy Max-Min Matrix

Digital images are used in the digital media for various purpose. These are required to be authen... more Digital images are used in the digital media for various purpose. These are required to be authenticated at some level to restrict its unauthorized usages. In order, to retain the copyright and authorization watermarking is useful concept. Watermarking are sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image is invisible watermarking. In this paper we will discuss encryption by fuzzy max-min matrix public- private key and embedding in digital image.

Research paper thumbnail of Survey on Digital Watermarking- A Digital Forensics & Security Application

This article presents an overview of various watermarking types and techniques. This is a survey ... more This article presents an overview of various watermarking types and techniques. This is a survey paper which categories watermarking methods into seven parts. Watermarking method depends upon visibility, document type, robustness , watermarking application areas, various techniques of watermarking, availability of original image for extraction of watermarks and after extraction of watermark. The paper foc us on watermarking as digital forensics and security application

Research paper thumbnail of Watermarking Digital Images Using hash code and λ - Cut of Fuzzy Set

Watermarking in digital images is for authentication and restricting it for unauthorized usages. ... more Watermarking in digital images is for authentication and restricting it for unauthorized usages. Videos and other digital contents are used often by unauthorized users. The se are used as public - private key for encryption and then embedding the watermark in digital images. For embedding watermark fuzzy matrices composition s of the two fuzzy matrices and its Fuzzy Neighbourhood Sets are used. There is further work done on emb edding a hash code in digital image. The hash function generates hash code and hash fi le of text file using λ cut fuzzy set for embedding watermark.

Research paper thumbnail of Steganalysis-Detection of Information Using Colormap

Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innoc... more Stegnography is covered writing i.e. the information is secretly embedded or hidden in some innocent looking system. Example shows how invisible ink is used to pass a message in text explaining some important information. Steganalysis is art of detecting stego object from the covered object. There are various ways and means to detect stego image. Here, we are using a methodology to detect the hidden information which is stored in the color of image.

Research paper thumbnail of Developing Optimized Technique for Organization of Record in Files in Database System of Durgapur Cement Works, Durgapur

This work is related to the problem encountered during routine work in database Durgapur Cement W... more This work is related to the problem encountered during routine work in database Durgapur Cement Works, Durgapur, Unit of Birla Corporation Ltd. , Kolkata specially with Oracle database. Apart from Oracle database, it can be also extended in generalized form in other System with respective modifications and cooperating with other complexities of the systems. This work is only for Oracle database where certain type of organization technique is built-in. The Information System Department was consisting of oracle as ERP system in 2001. Now, in 2014 SAP is implemented and every administrative staff, engineers and personnel are having computers at their desk in DCW. Present book is based on my thesis of MS(Software Systems) from BITS Pilani year 2001 on Durgapur Cement Works, Unit Birla Corporation Ltd.

Research paper thumbnail of Watermarking Digital Image Using Fuzzy Matrix Rules

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking are sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image is invisible watermarking. In this paper we will discuss encryption by proposed fuzzy complimentary-sum-minus matrix is public- private key and then embedding the watermark in digital images using fuzzy matrices using suitable composition of the two fuzzy matrices which are used for encryption as public key and private key.

Research paper thumbnail of Data Security: An issue in cloud computing for e-Learning

E-Learning is an innovative teaching learning process which has taken hype nowadays. Increasing u... more E-Learning is an innovative teaching learning process which has taken hype nowadays. Increasing usages of internet for learning process is very productive. As Wikipedia and other web resources are vividly used in teaching. The e-learning S/Ws, websites and portals are very interactive. Using cloud computing for e-learning is another step forward to innovation. As cloud computing provides Infrastructure as a Service(IaaS), Platform as a Service(PaaS) and Software as a Service (SaaS). Thus, for e-learning ,sites are used as cloud computing e.g. Google App Engine, Yahoo Hadoop ,Webguru and many others. Faculties made their own sites for online tests, online filling forms for training programmes, assignments, tutorials, question banks, presentations, time-tables etc. Instead of having completely own infrastructure , it is rather easy to use Google App Engine, which provides facilities like site creating features, emailing system, calendar, spreadsheets and presentations with accessing u...

Research paper thumbnail of Watermarking Digital Images Using Fuzzy Matrix Rules and Neighborhood Set

Watermarking is done in digital images for authentication and to restrict its unauthorized usages... more Watermarking is done in digital images for authentication and to restrict its unauthorized usages. Watermarking is sometimes invisible and can be extracted only by authenticated party. Encrypting a text or information by public –private key and then embedded in the digital image as invisible watermark. In this paper we proposed four fuzzy matrix compositions Mod-Minus-Product, Compliment-Mod-Minus-Product, Compliment-Min-Max and Compliment-Min-Product. These are used as public- private key for encryption and then embedding the watermark in digital images. For embedding fuzzy matrices composition of the two fuzzy matrices and its neighbourhood sets are used.

Research paper thumbnail of Teaching & Learning Soft Computing using ICT

The Information and Communication Technology(ICT) has enhanced the teaching–learning process with... more The Information and Communication Technology(ICT) has enhanced the teaching–learning process with various innovative methods like e-learning, m-learning, smart boards, social networking sites, blogs, wiki, Youtube , Teacher tube, wireless classroom microphones, video-conferences, e-readers etc. ICT provide utilility tools, techniques to learn coursewares or learning material in multiple knowledge domain. It is used to design , develop, evaluate teaching resources efficiently. Learning goal is described as analysis of the subject matter and retention of information in memory. Learning goals include acquired knowledge converted to applicable skills. In this paper teaching and learning is enhanced by using interactive website in addition to classroom teaching. The goal of developing a website on courseware of Soft Computing of is to enhance teaching & learning process with interaction with student out of the class. This can be also aid for the student who have for some unavoidable reas...