Kumkum Saxena - Academia.edu (original) (raw)
Papers by Kumkum Saxena
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
The objective of the paper was to reinforce security and to make privacy a priority in mailing se... more The objective of the paper was to reinforce security and to make privacy a priority in mailing services. There has been an excellent effort over a few decades to enhance the security of emails. ProtonMail has made an enormous breakthrough in the security field by using encryption as a base to reinforce the user’s data privacy and digital wellbeing. The security constraints prevent ProtonMail itself from deciphering the messages. ProtonMail has implemented various algorithms like SSL, TLS, TOR, and Open PGP to upgrade privacy. ProtonMail helps the field of Information Technology as it provides a secure e-mail experience with zero data sharing, which other mailing platforms cannot ensure. An analytical comparison was conducted to demonstrate how ProtonMail eradicates the vulnerabilities that other mailing services allow. The results demonstrated that the algorithms effectively prevent data breaches and are protected with the keys provided. The scope for threat significantly decreases and reflects on how it is an ideal platform to adopt in the coming future to seize possibilities of misconduct.
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021
During the 21st century pandemic, it has become difficult for students and teachers to engage phy... more During the 21st century pandemic, it has become difficult for students and teachers to engage physically in the aftermath of the epidemic, the process of assessing and grading students has become cumbersome. Multiple Choice Questions (MCQs) have increasingly become a more popular method of assessing a person's knowledge, but the questions which are generated directly from the chapter provided are readily available on the internet. Thus évaluer, the proposed approach solves this problem by paraphrasing the text, and thus the questions, so as to make it difficult to look it up on the internet. Usage of OMR(Optical Mark Recognition) sheets or manual correction had been prominent in the pre-pandemics situation. The évaluer automates the process of generation of MCQs which are difficult to search on the internet, and speeds up the task of grading a candidate's OMR answer sheet.
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
The IEEE 802.16e [Mobile Worldwide Interoperability for Microwave Access(MWiMAX)] standard suppor... more The IEEE 802.16e [Mobile Worldwide Interoperability for Microwave Access(MWiMAX)] standard supports the mobility of Subscriber Station (SS), thus making them Mobile Station (MS). This incurs one of the most challenging issues in IEEE 802.16e which is handover (HO). HO occurs whenever MS migrates from one cell to another. Reducing HO delay is significant to improve the Quality of Service (QoS). To reduce the delay, we propose a method where the amount of intersection between the coverage area of Serving Base Station (SBS) and the coverage area of Neighboring Base Station (NBS) is considered as one set of NBS (Set A). The NBS which are in the direction in which MS is moving forms another set of NBS (Set B). The NBS which exist in Set A as well as Set B will then be scanned by MS for finding a suitable TBS. The simulation is implemented in MATLAB and graphs are provided to show the improvement in terms of lesser packet drop and reduced handover delay than the standard approach as well as the adaptive approach.
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016
The paper proposes a method to make roads a safer place for driving by taking advantage of Intern... more The paper proposes a method to make roads a safer place for driving by taking advantage of Internet of Things (IoT) enabled vehicles. The proposed method is based on assessing the trust levels of each vehicle and the behavioral patterns of the driver. Proposed method also utilizes a mobile agent(MA) which would help detecting Misbehaving nodes in the IoT enabled Vehicular Adhoc NETwork (VANET). The proposed method works on the assumption that all the nodes in VANET comprises of the sensors which can give the required information about the user and sensor behavior. We also presume that the IoT backbone required to accomplish the architecture is laid down.
If you would like to write for this, or any other Emerald publication, then please use our Emeral... more If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.
2021 International Conference on Communication information and Computing Technology (ICCICT), 2021
The objective of the paper was to reinforce security and to make privacy a priority in mailing se... more The objective of the paper was to reinforce security and to make privacy a priority in mailing services. There has been an excellent effort over a few decades to enhance the security of emails. ProtonMail has made an enormous breakthrough in the security field by using encryption as a base to reinforce the user’s data privacy and digital wellbeing. The security constraints prevent ProtonMail itself from deciphering the messages. ProtonMail has implemented various algorithms like SSL, TLS, TOR, and Open PGP to upgrade privacy. ProtonMail helps the field of Information Technology as it provides a secure e-mail experience with zero data sharing, which other mailing platforms cannot ensure. An analytical comparison was conducted to demonstrate how ProtonMail eradicates the vulnerabilities that other mailing services allow. The results demonstrated that the algorithms effectively prevent data breaches and are protected with the keys provided. The scope for threat significantly decreases and reflects on how it is an ideal platform to adopt in the coming future to seize possibilities of misconduct.
2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT), 2021
During the 21st century pandemic, it has become difficult for students and teachers to engage phy... more During the 21st century pandemic, it has become difficult for students and teachers to engage physically in the aftermath of the epidemic, the process of assessing and grading students has become cumbersome. Multiple Choice Questions (MCQs) have increasingly become a more popular method of assessing a person's knowledge, but the questions which are generated directly from the chapter provided are readily available on the internet. Thus évaluer, the proposed approach solves this problem by paraphrasing the text, and thus the questions, so as to make it difficult to look it up on the internet. Usage of OMR(Optical Mark Recognition) sheets or manual correction had been prominent in the pre-pandemics situation. The évaluer automates the process of generation of MCQs which are difficult to search on the internet, and speeds up the task of grading a candidate's OMR answer sheet.
2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT), 2016
The IEEE 802.16e [Mobile Worldwide Interoperability for Microwave Access(MWiMAX)] standard suppor... more The IEEE 802.16e [Mobile Worldwide Interoperability for Microwave Access(MWiMAX)] standard supports the mobility of Subscriber Station (SS), thus making them Mobile Station (MS). This incurs one of the most challenging issues in IEEE 802.16e which is handover (HO). HO occurs whenever MS migrates from one cell to another. Reducing HO delay is significant to improve the Quality of Service (QoS). To reduce the delay, we propose a method where the amount of intersection between the coverage area of Serving Base Station (SBS) and the coverage area of Neighboring Base Station (NBS) is considered as one set of NBS (Set A). The NBS which are in the direction in which MS is moving forms another set of NBS (Set B). The NBS which exist in Set A as well as Set B will then be scanned by MS for finding a suitable TBS. The simulation is implemented in MATLAB and graphs are provided to show the improvement in terms of lesser packet drop and reduced handover delay than the standard approach as well as the adaptive approach.
2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES), 2016
The paper proposes a method to make roads a safer place for driving by taking advantage of Intern... more The paper proposes a method to make roads a safer place for driving by taking advantage of Internet of Things (IoT) enabled vehicles. The proposed method is based on assessing the trust levels of each vehicle and the behavioral patterns of the driver. Proposed method also utilizes a mobile agent(MA) which would help detecting Misbehaving nodes in the IoT enabled Vehicular Adhoc NETwork (VANET). The proposed method works on the assumption that all the nodes in VANET comprises of the sensors which can give the required information about the user and sensor behavior. We also presume that the IoT backbone required to accomplish the architecture is laid down.
If you would like to write for this, or any other Emerald publication, then please use our Emeral... more If you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors service information about how to choose which publication to write for and submission guidelines are available for all. Please visit www.emeraldinsight.com/authors for more information.