security system research papers 2015 IEEE PAPER





Development of The Multi-Level Fusion based Security System
free download

Abstract: The article develops the multi-level fusion based intelligent security system to be applied in home automation. The system contains some detection modules, a supervised computer, an elevator and an experimental platform. The detection modules have active

Security System for Sending Information Containing Hidden Voice Data by Steganography (SIOVE) Using Matlab
free download

Abstract:with the modern use of technology and communication, data and information travel through many channels. During transmission they may be vulnerable to passive or active attacks, in which messages are used by criminal groups to undermine the integrity

A New Implementation of Graphical Password Scheme for Captcha Based Security System
free download

Abstract: Passwords play a significant task in computer security to validate human users. Users rely on graphical passwords because it offers more security than the text-based passwords. The human brain is superior in recollecting a picture than textual characters. A

An Optical Fiber Security System Utilizing Fiber Bragg Grating Sensors
free download

In this study, we propose an optical fiber security system based on fiber Bragg grating (FBG) force-loading sensors embedded in the floor for security monitoring. FBG has the advantages of high sensitivity, small size, corrosion resistance, and resistance to

Region in the National Security System of Russia
free download

Abstract Security as an essential attribute of public life and the object of scientific knowledge is of considerable interest for economic and social geography and regional economy. The national security system is a multi-level and multi-component structure in which the region

A Digital Door Lock System for the Internet of Things with Improved Security and Usability
free download

Abstract. Recently, digital door locks have been widely used as part of the IoT (Internet of Things). However, the media has reported digital door locks being opened by invalid users to invade homes and offices. In this study, a digital door lock system that can work with the

WEB BASED REAL-TIME HOME AUTOMATION AND SECURITY SYSTEM
free download

In today's world automation plays a very important role and in this project an automated way of controlling home appliances through human interaction as well as through self-control of the system itself is provided. The manual mode helps user to control home appliances

named Secom announced the first drone for security purposes. The small 60 centimeter in diameter drone is capable of acting as a mobile security system.
free download

SECOM writes that their drone is equipped with a small but high definition camera. It can target and stream live footage straight to SECOM's headquarters. The Flying Security Robot can be preprogrammed to patrol areas that would otherwise be left

A microcontroller and GUI approach to reduce power consumption in lighting system and forsecurity system of Departmental stores
free download

In this research we explore the possibilities of developing the security system and reduce operational cost in departmental stores providing range of methods for maximum utilization of resources. We present a utility-based departmental store that can detect human

Security and Usability Improvement on a Digital Door Lock System based on Internet of Things
free download

Abstract Recently, digital door locks have been widely used as part of the IoT (Internet of Things). However, the media has reported digital door locks being opened by invalid users to invade homes and offices. In this study, a digital door lock system that can work with the

Smart Home Automation: GSM Security System DesignImplementation
free download

Abstract Smart home automation has attracted the interest of the research community during the last decade, at a great manner. Home security systems consist a constantly, year after year, developing research field. Some of these systems are limited to support basic

A 2D-DCT Image Processing in Matlab and Voice Informatics Based Remote Home Monitoring and Security System
free download

Abstract This paper proposes, designs and constructs an image recognitionvoice technology based security system by highlighting the advantages of image processing technology and voice synthesis technology which are presence in the electronic market.

Incorporation of Human Resistant System and Network Security System to improve Computer Security
free download

Abstract-Numerous of the present security systems do not provide satisfactory level of protection aligned with ever-increasing threats. The main reason for their collapse is the use of point solutions to protect hosts and reactive approach against intrusions. Here we

A New Data Hiding Technique with Multilayer Security System.
free download

ABSTRACT Information security plays an essential role during internet communication in today's era of technology. It is enormously important for people committing e-transactions like online shopping, money transfer etc. There are various methods that provide a means

RFID-GSM imparted School children Security System
free download

ABSTRACT With the advancement of the crime rate security is having its alarming significance for school children's. The safety mechanism to the transportation bus and to the children travelling from home to the school and resume back to home is a standalone

Nuzzer algorithm based Human Tracking and Security System for Device-Free PassiveSystem in Smart Phones Environment
free download

In recent years, majority of researches are focused on localization system for wireless environment. These researches rely on localization using devices to track the

DYSSS: A Dynamic and Context-Aware Security System for Shared Sensor Networks
free download

In recent years, we have witnessed the emergence of Shared Sensor Networks (SSNs) as a core component of cyber-physical systems for diverse applications. As Wireless Sensor and Actuator Networks (WSANs) design starts shifting from application-specific platforms to

RFID Security System in Libraries: Application of Library Management System
free download

Abstract Radio Frequency Identification (RFID) is one of the most exciting technologies that revolutionized the working practices by increasing efficiencies, and improving profitability. Deployment of radio frequency identification (RFID) systems is rapidly growing and has

Data security system using encryption key in digital images for secret communication
free download

ABSTRACT To enhance the system for secret data communication over unsecure channel supported Color Image and Encrypted info concealment victimization AES and Least important bit replacement methodology. The project proposes the development of security

Immigration as a Policy Tool for the Double Burden Problem of Prefunding Pay-as-you-go Social Security System
free download

Abstract The effect of accepting more immigrants on welfare in the presence of a pay-asyou- go social security system is analyzed theoretically and quantitatively in this study. First, it is shown that if intergenerational government transfers initially exist from the young to the old

SLA Aware Dynamic Reconfiguration for the Safe Building Security System
free download

Abstract Service-Oriented Architecture (SOA) facilitates development of Business-to- Business (B2B) applications, by composing suitable services, either statically during design- time or dynamically at run-time. Dynamic reconfiguration in the service-oriented approach,

Screening Romanian medical and social security system: self-ratings and healthcare feedback at local level
free download

Abstract In a two speed economic union, the social medical system has different patterns according to the region of development and its history. Furthermore in the new entered countries, as Romania, where this system is consolidated by the authorities which are

Design and Development of SMS Based Wireless Home Appliance Control and Security System
free download

The enhancement of mobile communication technology has led us to a certain level of progression in our daily life. Working with this concept motivated us to bring up a new and fresh concept of controlling the home appliances and the security surveillance system with

Information Systems Security Assessment Based on System Dynamics
free download

Abstract With the rapid development of information technology, information systems security becomes more and more important for both national economics and people's everyday life. Therefore, in this paper, we study on the problem of information systems security

Security in Multiple Clouds Using Distributed Depsky System
free download

Abstract: The use of cloud computing has increased briskly in abounding organizations. Cloud computing provides many benefits in terms of low cost and accessibility of data. Ensuring the security of cloud computing is a major factor in the cloud computing

Ethical Hacking: A Security Assessment Tool to Uncover Loopholes and Vulnerabilities in Network and to Ensure Protection to the System
free download

Abstract: During the development of the Internet, computer security has become a major concern for different industries, businesses and Governments. The organizations use the Internet for electronic commerce, advertising, information distribution and access, and

An Architecture of Security Enhanced Access Control System to prevent leak the internal Information
free download

Abstract. In this paper, we proposed an architecture of the security enhanced access control system to prevent leak the internal information in the business IT environment. Our proposed access control system added insider's contexts information, the security level of document

Introducing the Information Security Management System in Cloud Computing Environment
free download

Abstract: Numerous organizations coordinate and certify their information security systems according to the Information Security Management System (ISMS) standard. Available Cloud Computing Services (CCSs) include new types of vulnerability (management,

Design and Development of Advanced Security System
free download

Abstract: Now a day's so many useful technologies are coming out to make our life style more comfort, luxurious and secure, with these latest advanced technologies we are providing sophisticated security systems. The main aim of this project is to provide high

Development of system regulating and support for nuclear security in Belarus
free download

Abstract. A safeguards strengthening in Belarus is realized as complex for measures of responsible authorities, advance staff education and international cooperation. The main scope of complex coordinated activities is to provide the sustainable development of

High System-Code Security with Low Overhead
free download

Abstract:Security vulnerabilities plague modern systems because writing secure systems code is hard. Promising approaches can retrofit security automatically via runtime checks that implement the desired security policy; these checks guard critical operations, like

An Electronic Security Monitoring System Using GSM Communication
free download

Abstract Home security and monitoring are two significant parameters to safeguard the household components. An eye is to be focused specifically to perform the above two parameters. An electronic eye may substantially improve the safety mechanism of the

A constitutional status of the economic security system of the Russian Federation
free download

Abstract. This article considers the problem of a constitutional status of economic security, one of the key functions of any state. It outlines the role of economic security as a fundamental subsystem of national security of any country. Here an approach of Russian

Operating System Security
free download

No sharing Every process completely isolated Virtualization illustrates this approach Sharing originals of program or data files Read-only access to program Sharing data requires locking mechanisms Confined, or memoryless, subsystems No transfer of

Advanced Security Algorithm Using QRCodeImplemented for an Android SmartphoneSystem: A_QR
free download

Abstract: Due to tremendous growth of media and communication technology, now it is a real challenge to share/send some information through the insecure network/media ensuring that, the receiver will get the authentic information. For this reason Nath et al

Study on Security Risk Assessment for Information System Based on Fuzzy Set and Entropy Theory
free download

ABSTRACT In allusion to accuracy of security risk assessment for information systems in campus, put forth a method to evaluate security risks of the information system combining fuzzy set with the entropy theory. By analyzing risk factors involved in the information

PRACTICES IN THE FRAMEWORK OF AN INTEGRATED MANAGEMENT SYSTEMENVIRONMENT-HEALTH AND SAFETY-INFORMATION SECURITY
free download

ABSTRACT This paper highlights a part of the results of a doctoral research regarding information security management systems in the context of business excellence conducted by authors in the Research Centre of Business Administration of The Bucharest University

A Quantitative Evaluation of Security Indices for Nigerian National Grid System.
free download

ABSTRACT Security of a power system is the degree of risk and ability to survive imminent disturbances (contingencies) without interruption of continuous service. Security indices are parametric variables used to represent the degree of operation or malfunction of power

SUSTAINABLE ENERGY SECURITY FOR INDIA: AN ASSESSMENT OF ENERGY DEMAND SUB-SYSTEM
free download

Abstract This paper presents a quantitative assessment of Sustainable Energy Security (SES) of the energy demand sub-system for India by calculating a SES index. The demand sub-system has been evaluated for four dimensions of SES, viz., Availability, Affordability,

The Employment/Eligibility Service System: A New Gateway for Employment Supports and Social Security Disability Benefits
free download

ABSTRACT BACKGROUND: We propose to modernize the gateway to the Social Security Disability Insurance (SSDI) program in a manner that addresses two systemic problems with the economic security system for workers who experience threats to work because of

Assessment of Bio-Security Condition in Small Scale Poultry Production System in and Around Mekelle, Ethiopia
free download

Abstract: A survey and observational study was conducted to assess the bio-security condition in terms of traffic control, sanitation and isolation in small scale poultry farms in and around Mekelle. The data was collected from a survey of 25 small scale poultry farm

A Study and Comparison of NIR Hyperspectral Imaging and other Emerging Biometric Techniques in Security System
free download

ABSTRACT Different human body parts such as eyes, veins, voices, face, fingers etc. have been considered for the biometrics system. Even the typing style and signature of human being have been the part of biometrics. To satisfy the different needs of the global market,

DEPENDING ON SOCIAL FORCES TO PROMOTE THE SOCIAL SECURITY SYSTEMCONSTRUCTION
free download

Social security system is a main content and one of the most important symbols for the construction of Chinese modern society, it is a stabilizer for the society development and the key to guarantee the life quality of social members in our country. But with the increasingly

A Systematic Review of Studies on Cyber Physical System Security
free download

Abstract Cyber-Physical System (CPS) is a system of systems which integrates physical system with cyber capability in order to improve the physical performance [1]. So far, it is being widely applied in areas closely related to national economy and people's daily lives.

A NEW SECURITY SYSTEM APPLICATION FOR THEFT CONTROL
free download

Abstract: To ensure the actual presence of a real legitimate trait in contrast to a fake self- manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures.

System Security after Snowden
free download

Jan 9 2013: In the preceding 30 days, field collectors had processed and sent back 181,280,466 new records including metadata, which would indicate who sent or received e-mails and when, as well as content such as text, audio and video (from Yahoo! and

Power system security analysis under transmission line outage condition
free download

Abstract: The power system becomes more severe under contingency conditions. In general, the contingencies may be outage of transmission lines or generators. To identify the effect of outages on system security, the contingency analysis is one of the analytical tools. The

Information System Audit: Cloud Computing Security and Challenges
free download

Abstract:The Cloud Computing paradigm is getting popular deliberately and is being adopted in modern organizations because of its lower cost, scalability and high availability. This moves control of data from the owner to the cloud service provider and thus security

A Study on the Development of the Emergent System Recovery in an Effective Way from Hacking Attacks or Security Incidents
free download

Abstract The purpose of this paper is to study on the development of efficient system recovery from various hacking attacks or computer virus incidents. When computer system was damaged by hacking attacks or cyber incidents, and needed to be recovered

Application of Gravitational Search Algorithm to Improve Power System Security by Optimal Placement of FACTS Devices
free download

In deregulated power industry, system parameters such as bus voltages and line power flows are operated near the limit values to meet the demanded load. However, this is a very dangerous situation for the secure operation of power systems. In order to preserve the

Barcode and RFID Based Security System
free download

Abstract: This paper addresses a very common problem encountered in day to day life which often remains an abstract thought. Often in colleges, students run a risk of misplacement or theft of their valuables. A security system was designed and developed for safety of the

Best Plan for System Security
free download

Abstract System Security is a major issue in the Internet world and Information technology world. Computer or System is Electronic or electromagnetic device which work under predefine set of instruction example simply calculator, IT professional are working on large

Achieving global food security: Building a new food system where nutrition, climate change and sustainability collide
free download

Abstract We stand at the confluence of three of the greatest challenges that humanity faces in the 21st century: achieving global food and nutrition security; climate change; and agriculture's environmental footprint. A business-as-usual approach to agriculture will not

Power Transfer Enhancement and Optimal Power System Security by use of Unified Power Flow Controller (UPFC)
free download

This paper presents a discussion of the effect of Unified Power Flow Controller (UPFC) on Power Transfer Capability and Optimal Power System Security of a Nigerian 330kV network. By development and implementation of low frequency damping controller, UPFC is used

The Moderating Effect of Working Experience on Health Information System SecurityPolicies Compliance Behaviour
free download

ABSTRACT This study was conducted to investigate the moderating effect of health professional's working experience on the relationship between factors of Health Information System Security Policies Compliance Behaviour (HISSPC) model. A survey (ie, n= 454)

Requirement of Security for IoT Application based on Gateway System
free download

Abstract An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. The

Towards a Framework for Assuring Cyber Physical System Security.
free download

Abstract Today, cyber physical systems (CPS) are becoming popular in power networks, healthcare devices, transportation networks, industrial process and infrastructures. As cyber physical systems are used more and more extensively and thoroughly, security of cyber

Data Security for Email System in XML Format using Graceful Code and Graphical Password
free download

Abstract In a real world scenario, email has become the most widely communication way in daily life. The main intention for proposing this paper is to enhance the security of email system, as there are various standards such as secure multipurpose mail extension (s/

Security Analysis on Secure Untraceable Off-line Electronic Cash System
free download

Abstract In 2013, Baseri et al. proposed an untraceable off-line electronic cash scheme from the RSA cryptosystem. They used a method that injects the expiration date and the spenders identity onto the coin to prevent double spending. The authors claimed that the scheme

Studying Security Weaknesses of Android System.
free download

Abstract As smartphones are generalized, various technologies and services have been introduced and are in wide use. From simply using calling or texting services, Internet banking and transaction system that require sensitive personal information emerged.

HYBRID SECURITY AUTHENTICATION SYSTEM USING FINGER-VEIN
free download

ABSTRACT In order to improve the security, we proposed this work of real-time embedded finger-vein recognition system (FVRS) for authentication in banking sector. The proposed system consists of four hardware modules: radio frequency identification system (RFID),

Design and Implementation of Automotive Vehicle Security System
free download

Abstract-Automotive theft has been a persisting problem around the world and greater challenge comes from professional thieves. Modern security system can be deceived by professional thieves therefore a need of biometric authentication technology arises in

Enhancing Home Security Using SMS-based Intruder Detection System
free download

Abstract: Lifestyle in the modern society along with human behavior and thinking is changing dramatically with the advancement of technology, and the concept of a simple home is changing into a smart home. Home security has been a major issue where crime

Regular paper Comparison of Hybrid Differential Evolution Algorithm with Genetic Algorithm Based Power System Security Analysis Using FACTS
free download

This paper presents a novel stochastic hybrid differential evolutionary algorithm technique to find the optimal location of Flexible Alternating Current Transmission System (FACTS) devices with minimum cost of installation and to improve power system security and is

India's National Food Security Act 2013: Food Distribution through Revamped Public Distribution System or Food Stamps and Cash Transfers
free download

Abstract This paper has estimated the cost and benefit of procuring and distributing the increased foodgrains required in view of the National Food Security Act, 2013. It has critically appraised the feasibility of reforming the existing public distribution system vis-à-

Research of Power Online Security Auxiliary Decision System Based on Matlab Simulation
free download

Abstract: In this paper, To solve the parsing problems due to the difference among COMTRADE standards, unreadable code in remote transmission and incompleteness of data in the power system, this paper presents an algorithm that can correctly parse the file

A REAL-TIME CRIME RECORDS MANAGEMENT SYSTEM FOR NATIONAL SECURITYAGENCIES
free download

ABSTRACT: The present world is technology driven as it is employed by many fields in the performance of their operation. In the case of law enforcement agencies, this is evident in the use of automated crime record management systems (CRMS) worldwide to keep

Risk Assessment of Power System Security based on a Hybrid Optimization GP Method
free download

Abstract In this paper, we propose a hybrid optimization algorithm based on Improved Differential Evolution (IDE) algorithm and Gaussian Process (GP). Firstly, the paper constructs the assessment index system using Fault Tree Analysis (FTA) based on the

ANDROID PHONE SECURITY USING WI-FI POSITIONING SYSTEM
free download

Android is an open source full stack platform for developing applications for android based mobile phones. The wide spread usage of Android requires some areas for potential researchers. Mobility management, location awareness and security are among them.

BROKER LESS SYSTEM SECURITY WITH ENCRYPTION BASED ON UNIQUENESS
free download

ABSTRACT The proposed system presents a useful platform for delivering data from Publisher to Subscriber in an anonymous fashion in distributed network. We present scalable solutions for confidentiality, integrity, and authentication for the systems. We

Design and Development of System for detection of security Breach in Cloud Environment
free download

Abstract: Cloud Computing has brought an incredible change in operations of the IT industries. The cloud computing has benefited the IT industries with less infrastructure investment and maintenance. As cloud provides services like Infrastructure-as-service (

A Privacy and Security Aware Location Based Mobile Marketing and Rewarding System
free download

Abstract:A Mobile location-based service (MLBS) is a software application for a mobile device that requires knowledge about where the mobile device is located. Mobile location based services use the geographic location of a personal handset such as a personal

Data Collection and Processing of Cloud Security Botnet Protection System
free download



Analysis of Different Power Grid Segmentation and Transmission Schemes for PowerSystem Security Improvement
free download

Abstract-This paper explores the power grid segmentation concept for power system stability improvement in detail. First, the firewall property of grid segmentation is investigated for a two area network. Then two HVDC technologies, LCC and VSC, are compared for the

Towards A Requirements Model of System Security Using International Standards.
free download

Abstract Currently, security requirements are defined at system levels in software engineering projects as system quality requirements. Later on system engineers must identify such system requirements into software requirements. It will be assigned to system

Security Authentication System for In-Vehicle Network
free download

An automobile produced today may be equipped with more than 70 electronic control units (ECUs)(1) that are controlled via a controller area network (CAN),(2) local interconnect network (LIN),(3) FlexRay,(4) or other suitable network. While CAN is the most popular

A Complete Bibliography of ACM Transactions on Information and System Security
free download



Intrusion Detection System for Security of Mobile Communication Using Watchdog and Pathrater
free download

Abstract:The information transferred between nodes is made secure by Intrusion detection system (IDS) using techniques watchdog and path rater. By eavesdropping on the transmission of the next hop, the watchdog finds the misbehaving nodes. A path rater

Security Management System for Mobile Database Transaction Model using Encryption and Decryption Algorithm
free download

Abstract-Mobile database is a specialized class of distributed systems. There are security challenges due to the distributed nature of the mobile database application and the hardware constraints of mobile devices. This paper discusses about the security issues

NSPK Protocol Security Model Checking System Builder
free download

Abstract Cryptographic protocols are based cryptosystems based on interactive communication protocol, running on computer communication networks or distributed systems, by means of cryptographic algorithms to achieve key distribution, authentication

Research on Operating System Security Technology
free download



Overview of Germany's Social Security System. Principles and Historical Development
free download

The following slides of a presentation deal with the Social Sytem of Germany, Europe in keywords. It offers a brief summary of the social law system with a short historical review. Topics are: the welfare state, historical development of the social system, the social state

Efficient Security Alert Management System
free download

Abstract Nowadays there are several security tools that used to protect computer systems, computer networks, smart devices and etc. against attackers. Intrusion detection system is one of tools used to detect attacks. Intrusion Detection Systems produces large amount of

GAUSSIAN FILTER BASED BIOMETRIC SYSTEM SECURITY ENHANCEMENT
free download

Abstract-A novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or

Cloud Storage Security Interactive Proof System on Provable Data Possession using Audit Service
free download

Abstract: Cloud-predicated outsourced storage palliates the client's load for storage management and preservation by providing an equipollently scalable, low-cost, location- independent platform. Clients no longer have physical control of data designates that they

OPTIMAL PLACEMENT OF HTSFCL CONSIDERING OF POWER SYSTEM SECURITY AND STABILITY INDICES BY USING DIFFERENTIAL EVOLUTION.
free download

ABSTERACT: The limiting ability of the fault current of the high-temperature superconducting fault current limiter (HTSFCL) is based on the relation of the resistance and the temperature of the superconductor. YBa2Cu3O7 (YBCO) can be included in the second generation

Enhancement of Voltage Profile, System Security and Power Loss Minimization using Bacterial Foraging Algorithm and Optimal Installation of FACT Devices
free download

Abstract: Now way a days the economic growth of any country depends up on industrials development in that country. Its estimated that the power demand double in every seven years in developing countries, but in developed countries like USA the power demand

Sustainable Energy Security: Critical Taxonomy and System Dynamics Decision-Making Methodology
free download

In this context, in this manuscript we present a critical taxonomy of the state-of-the-art literature and practices that apply to all major issues that stakeholders need to address for the design of energy secure systems. More specifically, we first present the generic system

Disentangling the connections between the GMO-related food system and food and nutritionsecurity in Europe: A concept map from a systematic literature
free download

The recent food crisis of 2007/2008 brought to the light renewed concerns about the present and the future of Food and Nutrition Security (FNS2) all around the world. Short-term shocks (climate events, financial crisis) intertwined with long term pressures (climate change,

Implementation of a Secure Multi-level Steganography System for Data Security
free download

Abstract: Recent advances in steganography systems have shown good results in bringing reliable data security over the Internet. However, these systems have their unique vulnerabilities since they are faced with malicious attackers or hackers. Effective

THE IMPACT OF ENERGY STORAGE SYSTEM ON SECURITY CONSTRAINED UNIT COMMITMENT (SCUC) PROBLEM IN PRESENCE OF RENEWABLES
free download

order to maintain systemsecurity and reliability. Consequently, reserve2.2 Security Constrained Unit Commitment Adequacy and security of power system is defined as The reliability of a system is interpreted as satisfying two functions: adequacy and security.

Cyber Security Challenges in Higher Education System
free download

Abstract-Universities face a variety of cyber security threats. These include disruption to the functioning of a university network,targeted attempts to obtain valuable information from networks and their users. Universities also face a growing

FOREIGN AFFAIRS AND SECURITY POLICY–A FAVORABLE FRAMEWORK FOR CREATING A SINGLE VOICE FOR THE EUROPEAN DIPLOMATIC SYSTEM
free download

Abstract: Starting with the Lisbon Treaty, which establishes the new European diplomatic landscape structure, this paper analyses the difference between the objectives expressed in the treaties governing the European Union's foreign policy, and the diplomatic European

SECURITY AND RELIABILITY ISSUES IN THE DEPLOYMENT OF CLOUD COMPUTING SYSTEM
free download

Abstract The Cloud Computing (CC) is a new computer paradigm that provide Computer services in the form of services on demand, accessible from anywhere, anytime and by anyone. It aims to provide reliable, customized, dynamic computing environments focused

System ICT Security Policy and the Implementation by Local Authorities in Malaysia
free download

The purpose of this project is to investigate and resolve problems related to the implementation of the security policy in Marang District Council. Furthermore, the ICT Security Policy System is to be designed, developed in order to assist the Information

E-Voting security system through Biometric Cloud Computing Integration with virtual server application
free download

Abstract: Today, biometric cloud security creates a new explosion in technology. With the advent of Cloud Computing biometric security and reliability plays important role in national and international e-governments. In e-voting system, if we incorporated cloud based

Audio Based Security System with Image Steganography
free download

Abstract: Information security became main concern because information and communication technology is developing dynamically today. Many problems can occur if there is no information security issue. At the same time, security for multimedia data is also

Automated Security System using Surveillance
free download

Abstract The world is experiencing a vast implementation of home security. And automation plays a vital role in the day to day life. The aim of this paper is to provide high level security and automation of appliances. This paper Automated security system using surveillance

Security System for Mobile Messaging Applications
free download

Abstract Instant messaging (IM) applications are one of the most popular applications for smartphones. The IMs have the capability of sending messages or initiating voice calls via Internet which makes it almost cost free for the users to communicate with each other.

Review of existing Indian Voting System and hybrid design using Biometric Security in Voting Authentication Process
free download

Abstract Voting is a decision making mechanism in a consensus-based society and security is most essential part of voting. The critical role in determining the outcome of an election, Electronic Voting Systems must be designed and developed with the greatest care. It is

Applying Security and Privacy Enhancements to a Visual Localization and Tracking System
free download

Abstract--Sending data over the Internet without using security measures to keep the data protected from modification and even from eavesdropping is a dangerous practice and not recommended at all. The situation is even worse if the purpose of the communication is to

Assistive Security System based on ARM Processor for Physically Handicapped People
free download

Abstract: The Smart chair is a step taken with an intention to make a difference to the lives of people with restricted mobility. Smart systems are devices that incorporate functions of sensing, actuation and control through their capability of describing and analyzing a

The Albanian Social Security System and the Institutions of Social Protection in Albania
free download

Abstract The social security system in Albania consists of social assistance and social services, health services and health care insurance and social insurance schemes. In the social objectives of the constitution are declared that the State within the constitutional

Industrial Safety Security System Based On Gas Sensor with SMS Based Alerts
free download

Abstract: This project describes a security alarm system that can monitor an industry. This is a simple and useful security system and easy to install. This fire/smoke detector are easily available and can be interfaced with the microcontroller, with one of its many applications

ADVANCED SECURITY SYSTEM USING FACIAL RECOGNITION
free download

ABSTRACT Security plays vital role in public places. Security which depends on security guards or manually security system is not secure. There are many security systems available in real life. This paper investigates new security system using mat lab. Security system

PIR Based Security Home Automation System with Exclusive Video Transmission
free download

Abstract: Security is primary concern everywhere and for everyone. Every person wants his home, industry etc. to be secured. This project describes a security system that can monitor an industry and home. This is a simple and useful security system. Here our application

DESIGN AND DEVELOPMENT OF A PASSWORD-BASED DOOR LOCK SECURITY SYSTEM
free download

ABSTRACT This work is a design and development of a micro-controller based, password enabled door lock for home security. The work involved building a working model of a security door lock that is password protected with an AT89C52 microcontroller which

A Low Cost Remote Monitoring System with Built-In Security Feature for Vulnerable Environments
free download

Abstract: Greenhouses are often used for growing flowers, vegetablesfruits plants. The closed environment of a greenhouse has its own unique requirements, compared with outdoor production. Pests and diseases, and extremes of heat and humidity, have to be

Study on Data Security in Cloud Architecture Based on Kerberos authentication System
free download

ABSTRACT Technological expansions in cloud computing due to increased connectivity and exponentially blooming data has resulted in journey towards cloud architecture. Cloud computing is a technology where the users' use high services in form of software that

Improve the Performance of Social Networks Security Based on Semantic-Based Friend Recommendation System
free download

Abstract: In this paper, we present Friendbook, a novel semantic-based friend recommendation system for social networks, which recommends friends to users based on their life styles instead of social graphs. By taking advantage of sensor rich smart phone,

Embedded Based High Security Rifle Drawing and Deposit System for Armory using Finger Print and RFID
free download

Abstract: This paper is implemented to replace older rifle drawing system where each officer needs to enter his details like officer Id, Rifle Id in register book. Here we are using Finger print identification to particular officer and RFID tag is attached to each rifle for its

ip multimedia subsystem security



Security threats and solutions for application server of IP Multimedia Subsystem (IMS-AS)
free download

Abstract:In this paper we will explore security threats and attacks possibility and security solution for Application Server of IP Multimedia Subsystem (IMS-AS). The SIP Application Server is an important entity of IP Multimedia Subsystem (IMS) because applications

Securing IP Multimedia Subsystem with the appropriate security gateway and IPSec tunneling
free download

In this paper we presented the security vulnerabilities, threats, and possible attacks for IP Multimedia Subsystem and the appropriate Security Gateway and IPSec Tunneling. Multimedia Subsystemis an architectural framework for delivering Protocol services is in

Towards security and enrichment of the IP multimedia subsystem based multiparty conference
free download

ABSTRACT-Next Generation Networks (NGN) focuses to improve the telecommunication core and access networks and plan to transport all the services by encapsulating them into packets via a single IP based network. IP Multimedia Subsystem (IMS) serves as a Service

IP Multimedia Subsystem (IMS) security model
free download

Abstract-The IP multimedia subsystem (IMS) is a Next Generation Network (NGN) that integrates wireless, wireline and internet technologies. IMS enables the convergence of voice, data and multimedia services such as Voice over IP (VoIP), Video over IP, push-to-

Security in the Emergency Services Support for the IP Multimedia Subsystem (IMS)
free download

Abstract. In this paper, we describe some concrete attacks patterns related to the IMS emergency support framework. We provide some solutions about how to deal with threats that might be carried out against emergency services in general VoIP network. The details

STRENGTHENING SECURITY OF IP MULTIMEDIA SUBSYSTEM
free download

Abstract. IP Multimedia Subsystem (IMS) is defined by 3GPP/3GPP2 and has become as a major part of the next-generation networks (NGN) service delivery platform. IMS provides convergence of two most successful communication paradigms–data networks (the

A Proposed IP Multimedia Subsystem Security Framework for Long Term Evaluation (LTE) Networks
free download

Abstract:An IP Multimedia Subsystem security Framework for Long Term Evaluation (LTE) networks with multimedia services is proposed. It is based on the packet switched (IP) protocols which provide the best effort service. The paper creates an architecture for

CSE PROJECTS

FREE IEEE PAPER AND PROJECTS

FREE IEEE PAPER