anusha pai - Academia.edu (original) (raw)
Papers by anusha pai
River Publishers eBooks, May 18, 2023
Advances in Intelligent Systems and Computing, 2015
Major challenge for organizations in today’s era is to meet the security needs. Techniques for lo... more Major challenge for organizations in today’s era is to meet the security needs. Techniques for logging data, detecting intrusions, preventing intrusions have been evolving for years. This paper presents a solution to combine logging, and network based intrusion detection and prevention system. The system has been developed considering the Software Engineering framework of requirements analysis, design, implementation, and testing. For IPS open source tool snort is configured in inline mode, so that sensors captures packets and drops them in case of any suspicious activity is observed. Signatures for Detection and prevention help IPS in alerting the administrator and dropping the packet. Logging of dropped packets is done using Splunk. In the process it provides for cost effective, customizable and scalable solution alternative to Organizations.
International Journal of System & Software Engineering, Jun 1, 2019
In today's digital world no one likes slow loading web pages that test user's pat... more In today's digital world no one likes slow loading web pages that test user's patience and waste his time; hence the performance of web application becomes principal constituent of the user experience. This paper intends to focus on techniques for evaluating and improving Java web application's performance iteratively. This work will make use of best in class performance testing tools to evaluate the performance of the developed Java web application and further attempt to improve the applications performance using the analysis made from the performance test results. The analysis will enable to target the particular bottlenecks in the application that hamper its performance. The paper will focus on different performance enhancing techniques that can be incorporated into Java web development enabling to improve the performance of the application in the targeted areas to build efficient, swift and robust Java web applications which will run smoothly under heavy user load during peak business hours.
Automatic Text Summarization is the process of getting a condensed form of a textual document. Wi... more Automatic Text Summarization is the process of getting a condensed form of a textual document. With the growing information over the world wide web,text summarization becomes an important tool to reduce the information overload problem. Various text summarization techniques have been proposed for foreign languages but few techniques have been found for Indian languages. This paper provides a survey of extractive text summarization techniques for some Indian regional languages.
Safety and Reliability Modeling and its Applications, 2021
Successful maintenance work goes a long way in deciding both the life and quality of machine perf... more Successful maintenance work goes a long way in deciding both the life and quality of machine performance. There is a need to satisfy many objectives simultaneously while taking decision regarding the maintenance task. This chapter presents an application involving study of multiple responses simultaneously in optimization of preventive maintenance process using desirability function approach and Taguchi method. The approach is illustrated with a case from a pharmaceutical industry. The input variables studied in this work are number of machines, number of standby machines, crew size and mean time between failure, for optimizing the two responses; equipment utilization and mean time-to-repair. The study resulted in improvement of response values. A regression model is developed by relating input variables with the overall desirability value.
Advances in Intelligent Systems and Computing, 2014
In most of the accidents occurring in remote areas information about their occurrence does not re... more In most of the accidents occurring in remote areas information about their occurrence does not reach the emergency services on time. This can lead to fatalities or severe mental trauma to the accident victim till they are attended. In this paper development of real time collision detection and fleet management system is explained. The system has been developed adhering to the Software Engineering framework of systematic analysis, design, implementation, testing and modification. On the hardware front, an accelerometer has been used as a crash or rollover detector of the vehicle during and after a crash. With signals from an accelerometer, a severe collision is recognized and the vibration sensor will send a signal to microcontroller which in turn will activate GPS-GSM module. GPS module will send the coordinates that it receives from the satellite on a real time basis of the vehicle via GSM module to the website, where the operator can view the locations of the accident and send help appropriately. The entire system is simulated to understand its effectiveness in handling collision detection.
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018
Internet of Things(loT) has found various applications in healthcare systems with the capabilitie... more Internet of Things(loT) has found various applications in healthcare systems with the capabilities of connecting embedded devices in various systems to the internet providing immediate readings, remote monitoring and enabling enhanced decision making. Researchers have found critical vulnerabilities such as compromise of private health data, hackers monitoring private conversations via a baby monitor, compromise of a moving internet enabled car or shutting it down altogether while in motion. Attention to security is not increasing at the same rapid pace as the number of IoT devices. Hence, security is beginning to be a major concern with the advent of IoT, connecting numerous devices introducing new attack vectors. This paper is intended to focus on the benefits of integrating security in IoT. The paper begins with design and implementation of a basic Health Monitor for remote monitoring and tracking of pulse rate and body temperature of patients treated in hospitals. While developin...
2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018
As we know in today's era, people are keen in exchanging the data online with the other membe... more As we know in today's era, people are keen in exchanging the data online with the other members in the cloud via data storage and retrieval. However Storage and retrieval of data are one of the key issues encountered in Cloud Computing domain. Here in my research, the data will be stored in cloud in groups. With untrusted cloud also being taken into the account, several algorithms like Group Signature verification and strong encryption-decryption techniques will be used to secretly share the data with other users. It introduces a trusted third party as a Data Center to activate and deactivate a new user and to reveal the real identity of the user in case of any disputes and also Private Key Generator (PKG) that will responsible in generating the private keys that will be used by the members and Data Center.
Safety, operability and reliability considerations are vital components of a chemical manufacturi... more Safety, operability and reliability considerations are vital components of a chemical manufacturing unit. It is a well-accepted fact that the operating team inherits a facility that is already built and its performance is dependent on how robust or otherwise, the installed facility is. Therefore it is important to ensure that safety and reliability factors are given due consideration right from the inception and project execution stage. This work examines the factors that influence eventual safety-operability-reliability of the unit, right at the inception and execution stage. The work also looks at relevant frameworks, practices and tools to ensure adequate coverage. Safety, operability and reliability considerations during inception and project stage are presented by conducting detailed analysis of characteristics of chemical manufacturing units, recommending best practices and concepts used/can be used. The relevant tools and practices used for the study are Engineering Project P...
Medical records in an electronic format are a un iform way of storing necessary medical data, inf... more Medical records in an electronic format are a un iform way of storing necessary medical data, information and other relevant records about patients with the objective of making easy availability of the necessary data at the required time. These records are of grave importance to the medical establishments, however storing such large amounts of patient records as well as maintain ing its privacy is the need of the hour. Utilizing cloud services and encryption techniques will make the needed health care operations more convenient and cost effective. In this paper, we make use of cloud computing techniques that solves the problem of storage, helps in faster retrieval and maintenance of records. This paper also uses hybrid encryption technique (Symmetric and Asymmetric encryption) that ensures privacy and prevents unsolicited access of the medical data thus providing a privacy preserving encrypted cloud data search service. While on the other side to meet the efficient data retrieval pr...
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
The amount of information over the world wide web is increasing at an alarming pace. This has cau... more The amount of information over the world wide web is increasing at an alarming pace. This has caused a difficulty in finding important and useful information. Text summarization solves this problem by providing a condensed form of a textual document that contains the most relevant information. Summaries can be of two types: Extractive and Abstractive. Various text summarization techniques have been proposed for foreign languages but few techniques have been found for Indian languages. This paper presents a novel approach to summarize Konkani documents. The proposed idea involves taking a single document as input and generating a summary by using sentence extraction method.
Springer Series in Reliability Engineering
Advances in Intelligent Systems and Computing
International Journal of Quality & Reliability Management
PurposeThis paper is focused at studying the current state of research involving the four dimensi... more PurposeThis paper is focused at studying the current state of research involving the four dimensions of defect management strategy, i.e. software defect analysis, software quality, software reliability and software development cost/effort.Design/methodology/approachThe methodology developed by Kitchenham (2007) is followed in planning, conducting and reporting of the systematic review. Out of 625 research papers, nearly 100 primary studies related to our research domain are considered. The study attempted to find the various techniques, metrics, data sets and performance validation measures used by researchers.FindingsThe study revealed the need for integrating the four dimensions of defect management and studying its effect on software performance. This integrated approach can lead to optimal use of resources in software development process.Research limitations/implicationsThere are many dimensions in defect management studies. The authors have considered only vital few based on th...
International Journal of System Assurance Engineering and Management
International Journal of System Assurance Engineering and Management
Advances in Intelligent Systems and Computing, 2012
International Journal of System Assurance Engineering and Management, 2013
International Journal of Computer Applications, 2013
Most of the existing encryption algorithms are best suited for textual data and cannot directly b... more Most of the existing encryption algorithms are best suited for textual data and cannot directly be applied on images since image data have special features such as bulk capacity, high redundancy and high correlation among pixels that imposes special requirements on the encryption technique used. Therefore, image security has its own special requirements that lead to different thoughts to protect digital data.In this paper, the proposed system would overcome the problem of security and storage by encrypting and compressing the image.The image would be encrypted using a key matrix and then compressed using the proposed algorithms for encryption and compression on the sender side. Similarly on the receiver side the received image would be decompressed and decrypted using the same key. The proposed encryption algorithm encrypts the pixel values by exoring these values with the key generated by the key generation algorithm and then compresses these encrypted pixel values using a specific encoding scheme. This system can be used in any application where image needs to be sent over an insecure channel.
International Journal of System and Software Engineering, 2019
In today's digital world no one likes slow loading web pages that test user's patience and waste ... more In today's digital world no one likes slow loading web pages that test user's patience and waste his time; hence the performance of web application becomes principal constituent of the user experience. This paper intends to focus on techniques for evaluating and improving Java web application's performance iteratively. This work will make use of best in class performance testing tools to evaluate the performance of the developed Java web application and further attempt to improve the applications performance using the analysis made from the performance test results. The analysis will enable to target the particular bottlenecks in the application that hamper its performance. The paper will focus on different performance enhancing techniques that can be incorporated into Java web development enabling to improve the performance of the application in the targeted areas to build efficient, swift and robust Java web applications which will run smoothly under heavy user load during peak business hours.
River Publishers eBooks, May 18, 2023
Advances in Intelligent Systems and Computing, 2015
Major challenge for organizations in today’s era is to meet the security needs. Techniques for lo... more Major challenge for organizations in today’s era is to meet the security needs. Techniques for logging data, detecting intrusions, preventing intrusions have been evolving for years. This paper presents a solution to combine logging, and network based intrusion detection and prevention system. The system has been developed considering the Software Engineering framework of requirements analysis, design, implementation, and testing. For IPS open source tool snort is configured in inline mode, so that sensors captures packets and drops them in case of any suspicious activity is observed. Signatures for Detection and prevention help IPS in alerting the administrator and dropping the packet. Logging of dropped packets is done using Splunk. In the process it provides for cost effective, customizable and scalable solution alternative to Organizations.
International Journal of System & Software Engineering, Jun 1, 2019
In today's digital world no one likes slow loading web pages that test user's pat... more In today's digital world no one likes slow loading web pages that test user's patience and waste his time; hence the performance of web application becomes principal constituent of the user experience. This paper intends to focus on techniques for evaluating and improving Java web application's performance iteratively. This work will make use of best in class performance testing tools to evaluate the performance of the developed Java web application and further attempt to improve the applications performance using the analysis made from the performance test results. The analysis will enable to target the particular bottlenecks in the application that hamper its performance. The paper will focus on different performance enhancing techniques that can be incorporated into Java web development enabling to improve the performance of the application in the targeted areas to build efficient, swift and robust Java web applications which will run smoothly under heavy user load during peak business hours.
Automatic Text Summarization is the process of getting a condensed form of a textual document. Wi... more Automatic Text Summarization is the process of getting a condensed form of a textual document. With the growing information over the world wide web,text summarization becomes an important tool to reduce the information overload problem. Various text summarization techniques have been proposed for foreign languages but few techniques have been found for Indian languages. This paper provides a survey of extractive text summarization techniques for some Indian regional languages.
Safety and Reliability Modeling and its Applications, 2021
Successful maintenance work goes a long way in deciding both the life and quality of machine perf... more Successful maintenance work goes a long way in deciding both the life and quality of machine performance. There is a need to satisfy many objectives simultaneously while taking decision regarding the maintenance task. This chapter presents an application involving study of multiple responses simultaneously in optimization of preventive maintenance process using desirability function approach and Taguchi method. The approach is illustrated with a case from a pharmaceutical industry. The input variables studied in this work are number of machines, number of standby machines, crew size and mean time between failure, for optimizing the two responses; equipment utilization and mean time-to-repair. The study resulted in improvement of response values. A regression model is developed by relating input variables with the overall desirability value.
Advances in Intelligent Systems and Computing, 2014
In most of the accidents occurring in remote areas information about their occurrence does not re... more In most of the accidents occurring in remote areas information about their occurrence does not reach the emergency services on time. This can lead to fatalities or severe mental trauma to the accident victim till they are attended. In this paper development of real time collision detection and fleet management system is explained. The system has been developed adhering to the Software Engineering framework of systematic analysis, design, implementation, testing and modification. On the hardware front, an accelerometer has been used as a crash or rollover detector of the vehicle during and after a crash. With signals from an accelerometer, a severe collision is recognized and the vibration sensor will send a signal to microcontroller which in turn will activate GPS-GSM module. GPS module will send the coordinates that it receives from the satellite on a real time basis of the vehicle via GSM module to the website, where the operator can view the locations of the accident and send help appropriately. The entire system is simulated to understand its effectiveness in handling collision detection.
2018 Second International Conference on Electronics, Communication and Aerospace Technology (ICECA), 2018
Internet of Things(loT) has found various applications in healthcare systems with the capabilitie... more Internet of Things(loT) has found various applications in healthcare systems with the capabilities of connecting embedded devices in various systems to the internet providing immediate readings, remote monitoring and enabling enhanced decision making. Researchers have found critical vulnerabilities such as compromise of private health data, hackers monitoring private conversations via a baby monitor, compromise of a moving internet enabled car or shutting it down altogether while in motion. Attention to security is not increasing at the same rapid pace as the number of IoT devices. Hence, security is beginning to be a major concern with the advent of IoT, connecting numerous devices introducing new attack vectors. This paper is intended to focus on the benefits of integrating security in IoT. The paper begins with design and implementation of a basic Health Monitor for remote monitoring and tracking of pulse rate and body temperature of patients treated in hospitals. While developin...
2018 2nd International Conference on Trends in Electronics and Informatics (ICOEI), 2018
As we know in today's era, people are keen in exchanging the data online with the other membe... more As we know in today's era, people are keen in exchanging the data online with the other members in the cloud via data storage and retrieval. However Storage and retrieval of data are one of the key issues encountered in Cloud Computing domain. Here in my research, the data will be stored in cloud in groups. With untrusted cloud also being taken into the account, several algorithms like Group Signature verification and strong encryption-decryption techniques will be used to secretly share the data with other users. It introduces a trusted third party as a Data Center to activate and deactivate a new user and to reveal the real identity of the user in case of any disputes and also Private Key Generator (PKG) that will responsible in generating the private keys that will be used by the members and Data Center.
Safety, operability and reliability considerations are vital components of a chemical manufacturi... more Safety, operability and reliability considerations are vital components of a chemical manufacturing unit. It is a well-accepted fact that the operating team inherits a facility that is already built and its performance is dependent on how robust or otherwise, the installed facility is. Therefore it is important to ensure that safety and reliability factors are given due consideration right from the inception and project execution stage. This work examines the factors that influence eventual safety-operability-reliability of the unit, right at the inception and execution stage. The work also looks at relevant frameworks, practices and tools to ensure adequate coverage. Safety, operability and reliability considerations during inception and project stage are presented by conducting detailed analysis of characteristics of chemical manufacturing units, recommending best practices and concepts used/can be used. The relevant tools and practices used for the study are Engineering Project P...
Medical records in an electronic format are a un iform way of storing necessary medical data, inf... more Medical records in an electronic format are a un iform way of storing necessary medical data, information and other relevant records about patients with the objective of making easy availability of the necessary data at the required time. These records are of grave importance to the medical establishments, however storing such large amounts of patient records as well as maintain ing its privacy is the need of the hour. Utilizing cloud services and encryption techniques will make the needed health care operations more convenient and cost effective. In this paper, we make use of cloud computing techniques that solves the problem of storage, helps in faster retrieval and maintenance of records. This paper also uses hybrid encryption technique (Symmetric and Asymmetric encryption) that ensures privacy and prevents unsolicited access of the medical data thus providing a privacy preserving encrypted cloud data search service. While on the other side to meet the efficient data retrieval pr...
2019 10th International Conference on Computing, Communication and Networking Technologies (ICCCNT)
The amount of information over the world wide web is increasing at an alarming pace. This has cau... more The amount of information over the world wide web is increasing at an alarming pace. This has caused a difficulty in finding important and useful information. Text summarization solves this problem by providing a condensed form of a textual document that contains the most relevant information. Summaries can be of two types: Extractive and Abstractive. Various text summarization techniques have been proposed for foreign languages but few techniques have been found for Indian languages. This paper presents a novel approach to summarize Konkani documents. The proposed idea involves taking a single document as input and generating a summary by using sentence extraction method.
Springer Series in Reliability Engineering
Advances in Intelligent Systems and Computing
International Journal of Quality & Reliability Management
PurposeThis paper is focused at studying the current state of research involving the four dimensi... more PurposeThis paper is focused at studying the current state of research involving the four dimensions of defect management strategy, i.e. software defect analysis, software quality, software reliability and software development cost/effort.Design/methodology/approachThe methodology developed by Kitchenham (2007) is followed in planning, conducting and reporting of the systematic review. Out of 625 research papers, nearly 100 primary studies related to our research domain are considered. The study attempted to find the various techniques, metrics, data sets and performance validation measures used by researchers.FindingsThe study revealed the need for integrating the four dimensions of defect management and studying its effect on software performance. This integrated approach can lead to optimal use of resources in software development process.Research limitations/implicationsThere are many dimensions in defect management studies. The authors have considered only vital few based on th...
International Journal of System Assurance Engineering and Management
International Journal of System Assurance Engineering and Management
Advances in Intelligent Systems and Computing, 2012
International Journal of System Assurance Engineering and Management, 2013
International Journal of Computer Applications, 2013
Most of the existing encryption algorithms are best suited for textual data and cannot directly b... more Most of the existing encryption algorithms are best suited for textual data and cannot directly be applied on images since image data have special features such as bulk capacity, high redundancy and high correlation among pixels that imposes special requirements on the encryption technique used. Therefore, image security has its own special requirements that lead to different thoughts to protect digital data.In this paper, the proposed system would overcome the problem of security and storage by encrypting and compressing the image.The image would be encrypted using a key matrix and then compressed using the proposed algorithms for encryption and compression on the sender side. Similarly on the receiver side the received image would be decompressed and decrypted using the same key. The proposed encryption algorithm encrypts the pixel values by exoring these values with the key generated by the key generation algorithm and then compresses these encrypted pixel values using a specific encoding scheme. This system can be used in any application where image needs to be sent over an insecure channel.
International Journal of System and Software Engineering, 2019
In today's digital world no one likes slow loading web pages that test user's patience and waste ... more In today's digital world no one likes slow loading web pages that test user's patience and waste his time; hence the performance of web application becomes principal constituent of the user experience. This paper intends to focus on techniques for evaluating and improving Java web application's performance iteratively. This work will make use of best in class performance testing tools to evaluate the performance of the developed Java web application and further attempt to improve the applications performance using the analysis made from the performance test results. The analysis will enable to target the particular bottlenecks in the application that hamper its performance. The paper will focus on different performance enhancing techniques that can be incorporated into Java web development enabling to improve the performance of the application in the targeted areas to build efficient, swift and robust Java web applications which will run smoothly under heavy user load during peak business hours.