Jaishma Kumari B - Academia.edu (original) (raw)
Uploads
Papers by Jaishma Kumari B
International Journal of Advanced Research in Science, Communication and Technology, 2021
When developing software today, we still use old tools and ideas. Maybe it is time to start from ... more When developing software today, we still use old tools and ideas. Maybe it is time to start from scratch and try tools and languages that are more in line with how we actually want to develop software. The Go Programming Language was created at Google by a rather famous trio: Rob Pike, Ken Thompson and Robert Griesemer. Before introducing Go, the company suffered from their development process not scaling well due to slow builds, uncontrolled dependencies, hard to read code, poor documentation and so on. Go is set out to provide a solution for these issues. The purpose of this master’s thesis was to review the current state of the language. This is not only a study of the language itself but an investigation of the whole software development process using Go. The study was carried out from an embedded development perspective which includes an investigation of compilers and cross-compilation. We found that Go is exciting, fun to use and fulfills what is promised in many cases. Howeve...
An Annotation is a Meta information connected to a record or other information. It makes referenc... more An Annotation is a Meta information connected to a record or other information. It makes references to a particular part of the document and Information quality is the level of information quality retrieved. It is imperative as client needs exact and auspicious data. As information quality is the real issue in current databases this application concentrates on enhancing the information quality. Extensive information is produced in various associations which are in printed form. In such information, organized data gets shadowed in unstructured data. Numerous calculations takes a shot at extraction of data from crude information, however which is exorbitant and not proficient furthermore indicates polluted results. Information quality is likewise the fundamental issue. In existing framework utilized comment for question inquiry and work on property recommendation which makes questioning feasible however explanation that utilizes characteristic quality sets oblige clients to be more pr...
Assistant Professor, Department of Computer Science and Engineering, Srinivas Institute of Techno... more Assistant Professor, Department of Computer Science and Engineering, Srinivas Institute of Technology, Merlapadavu, Valachil, Mangalore -574 143, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The Vehicular ad-hoc network is an important component of Intelligent Transportation Systems, which has a future potential in terms of different application that it can provide. It presents a very complex cyber-physical system where vehicles need to frequently broadcast their geographic information. Efficient working of the complete system requires proper processing of large data traffic rate that may be caused due to safety message broadcasting in an area with a high density of vehicles. This paper aims at study and analysis of protocol for reducing computation caused by the safety message authentication. Main focus of the study is a cooperative message authentication protoco...
Students, Guide Department of Information Science and Engineering, Alva’s Institute of Engineerin... more Students, Guide Department of Information Science and Engineering, Alva’s Institute of Engineering and Technology, Moodbidri, Karnataka, India Abstract: The traditional approach towards energy auditing is not adequate for today’s energy monitoring as it lacks the necessary data to estimate energy needs. The objective is to obtain more accurate information from single consumers connected to the lowand medium-voltage grid and to find new ways of making our everyday lives more energy efficient. We offer an innovative solution towards energy auditing and full control over the meters by making traditional energy meters to be smart. These sensor elements are originally deployed for invoicing purposes, they allow a previously unattainable degree of detail in state estimation and other grid analysis functionalities. Including the above functionalities, this allows real-time energy monitoring, Power factor inspection, Load scheduling during peak hours via collected data and energy theft.
International Journal of Advanced Research in Science, Communication and Technology, 2021
Computer use is becoming part of our lives every other day however there have been considerable t... more Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its ...
2009 Cybersecurity Applications & Technology Conference for Homeland Security, 2009
Global Internet threats have undergone a profound transformation from attacks designed solely to ... more Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field of botnet technology and defense.
International Journal of Advanced Research in Science, Communication and Technology, 2021
When developing software today, we still use old tools and ideas. Maybe it is time to start from ... more When developing software today, we still use old tools and ideas. Maybe it is time to start from scratch and try tools and languages that are more in line with how we actually want to develop software. The Go Programming Language was created at Google by a rather famous trio: Rob Pike, Ken Thompson and Robert Griesemer. Before introducing Go, the company suffered from their development process not scaling well due to slow builds, uncontrolled dependencies, hard to read code, poor documentation and so on. Go is set out to provide a solution for these issues. The purpose of this master’s thesis was to review the current state of the language. This is not only a study of the language itself but an investigation of the whole software development process using Go. The study was carried out from an embedded development perspective which includes an investigation of compilers and cross-compilation. We found that Go is exciting, fun to use and fulfills what is promised in many cases. Howeve...
An Annotation is a Meta information connected to a record or other information. It makes referenc... more An Annotation is a Meta information connected to a record or other information. It makes references to a particular part of the document and Information quality is the level of information quality retrieved. It is imperative as client needs exact and auspicious data. As information quality is the real issue in current databases this application concentrates on enhancing the information quality. Extensive information is produced in various associations which are in printed form. In such information, organized data gets shadowed in unstructured data. Numerous calculations takes a shot at extraction of data from crude information, however which is exorbitant and not proficient furthermore indicates polluted results. Information quality is likewise the fundamental issue. In existing framework utilized comment for question inquiry and work on property recommendation which makes questioning feasible however explanation that utilizes characteristic quality sets oblige clients to be more pr...
Assistant Professor, Department of Computer Science and Engineering, Srinivas Institute of Techno... more Assistant Professor, Department of Computer Science and Engineering, Srinivas Institute of Technology, Merlapadavu, Valachil, Mangalore -574 143, Karnataka, India ---------------------------------------------------------------------***--------------------------------------------------------------------Abstract The Vehicular ad-hoc network is an important component of Intelligent Transportation Systems, which has a future potential in terms of different application that it can provide. It presents a very complex cyber-physical system where vehicles need to frequently broadcast their geographic information. Efficient working of the complete system requires proper processing of large data traffic rate that may be caused due to safety message broadcasting in an area with a high density of vehicles. This paper aims at study and analysis of protocol for reducing computation caused by the safety message authentication. Main focus of the study is a cooperative message authentication protoco...
Students, Guide Department of Information Science and Engineering, Alva’s Institute of Engineerin... more Students, Guide Department of Information Science and Engineering, Alva’s Institute of Engineering and Technology, Moodbidri, Karnataka, India Abstract: The traditional approach towards energy auditing is not adequate for today’s energy monitoring as it lacks the necessary data to estimate energy needs. The objective is to obtain more accurate information from single consumers connected to the lowand medium-voltage grid and to find new ways of making our everyday lives more energy efficient. We offer an innovative solution towards energy auditing and full control over the meters by making traditional energy meters to be smart. These sensor elements are originally deployed for invoicing purposes, they allow a previously unattainable degree of detail in state estimation and other grid analysis functionalities. Including the above functionalities, this allows real-time energy monitoring, Power factor inspection, Load scheduling during peak hours via collected data and energy theft.
International Journal of Advanced Research in Science, Communication and Technology, 2021
Computer use is becoming part of our lives every other day however there have been considerable t... more Computer use is becoming part of our lives every other day however there have been considerable threats of computer viruses in the recent past. Viruses have had adverse effects on data and programs ranging from formatting hard disks, damaging information infrastructure, suddenly restarting machines, deleting or modifying data and in some cases mild effects such as slowing down machines or producing irritating sounds. Viruses have been a major cause for worry especially with the advances in data processing, storage and movement of information technologically. Many computer users and organizations especially the computer intensive organizations have had to invest heavily in dealing with viruses particularly those organizations running the windows platform. These computer viruses have been defined by their characteristics of entry and multiplication without the user’s notice as well as diverting the normal functioning of the computer. This paper seeks to define a virus and explain its ...
2009 Cybersecurity Applications & Technology Conference for Homeland Security, 2009
Global Internet threats have undergone a profound transformation from attacks designed solely to ... more Global Internet threats have undergone a profound transformation from attacks designed solely to disable infrastructure to those that also target people and organizations. At the center of many of these attacks are collections of compromised computers, or Botnets, remotely controlled by the attackers, and whose members are located in homes, schools, businesses, and governments around the world [6]. In this survey paper we provide a brief look at how existing botnet research, the evolution and future of botnets, as well as the goals and visibility of today's networks intersect to inform the field of botnet technology and defense.