Santhosh Kumar Singh
Unknown Affiliation

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Explanatory Server Protection Problem for Automated Wireless System Singh Poja Ramesh; Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp302-305

Abstract

Many sorts of servers exists which incorporates both openly available servers and inside servers, for example, mail servers, web servers, application servers, assemble and test servers and so forth., that store numerous private and delicate data. Giving security to such servers has turned out to be one of the center necessities in this day and age as they are under danger of assault. The information put away on the server can go from hierarchical data, for example, classified client related records, extend subtle elements, company's product source code to private media data, individual information, national security related data, patients database, address papers of the focused exams and so forth. On the off chance that such delicate information gets into wrong hands, it can be abused. Along these lines the business and the notoriety of the association would beat stake. It can likewise posture risk to countries. The fundamental reasons of security break in servers is because of the utilization of versatile stockpiling gadgets, for example, pen drives, hard circles, and so on., which can be potential transporters of malware and Trojans. At the point when tainted by such infection, these compact stockpiling gadgets can bring about serious harm. Physically keeping up and securing servers would be extremely troublesome and can likewise prompt tremendous authoritative overhead. Henceforth the requirement for computerized security system to distinguish, keep and shield the servers from the aggressors. Security strategies assume a critical part in keeping the trade off of system security which would influence the server security.
Enhanced Automaton Monitoring Method on Satellite Receiving Position Upadhyay Anand Trilokinath; Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp289-293

Abstract

Security is an essential need of system and it is one of center innovation of remote controlled system. Robot checking arrangement of sea remote detecting satellite getting station incorporates robot, distributed computing system and remote terminals. Robot procures continuous picture of controlled system and works it; distributed computing system fabricate visual choice subsystem to recognize the objective utilizing wavelet change calculation, neural system calculation and learning database of components video of particular natural; utilizing remote terminal manager watches the controlled system through its scene test system and control robot to work it remotely. Utilizing innovation of the pseudo-irregular number secret word, innovation of shared verification to counteract cloning site, innovation of change between the picture of controlled system and its status code and innovation of transformation between operation codes and operation guidelines, the security quality of the robot observing system is enhanced incredibly.
Fuzzy Cognitive Maps Based Game Balancing System in Real Time Patel Kalpana Dhanji; Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp335-341

Abstract

Players may stop playing a picked amusement sooner than anticipated for some reasons. A standout amongst the most vital is identified with the way amusement planners and designers adjust diversion challenge levels. Practically speaking, players have distinctive ability levels and may discover common foreordained troublesome levels as too simple or too hard, getting to be noticeably disappointed or exhausted. The outcome might be diminished inspiration to continue playing the diversion, which implies decreased engagement. A way to deal with alleviate this issue is dynamic amusement trouble adjusting, which is a procedure that alters diversion play parameters progressively as indicated by the present player aptitude level. In this paper we propose a constant answer for DGB utilizing Evolutionary Fuzzy Cognitive Maps, for progressively adjusting a diversion trouble, giving a very much adjusted level of test to the player. Transformative Fuzzy Cognitive Maps depend on ideas that speak to setting diversion factors and are connected by fluffy and probabilistic causal connections that can be refreshed progressively. We talk about a few re-enactment tries that utilization our answer in a runner sort amusement to make all the more captivating and dynamic diversion encounters.
Improvement of Data Security Using Mixcolumn Singh Poja Ramesh; Santhosh Kumar Singh
Indonesian Journal of Electrical Engineering and Computer Science Vol 9, No 2: February 2018
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v9.i2.pp361-364

Abstract

Advanced Encryption Standard is the security based algorithm used to protect the data from the attackers.In this paper, Optimized Inverse MixColumn transformation has been designed with the help of Xtime multiplication process. Xtime multiplication performs the multiplication function for ‘m X m’ data; results will be m-bit data. Further the complexity of Xtime multiplication process has been identified and re-designed with the help of effective CSE techniques. Developed Reduced Xtime based optimized Inverse MixColumn transformation provide better performances than traditional Xtime based Inverse MixColumn multiplication.