Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


21 - 30 / 41
First pagePrevious page12345Next pageLast page
21.
A novel lightweight encryption scheme for multimedia data
Rajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, original scientific article

Abstract: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system.
Keywords: chaotic maps, lightweight schemes, multimedia encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1872; Downloads: 10
URL Link to full text
This document has many files! More...

22.
Efficient and secured video encryption scheme for lightweight devices
Rajan Gupta, Neeharika Chaudhary, Anika Garg, Saibal K. Pal, 2014, original scientific article

Abstract: Technological advancements in the field of multimedia have made access to information effortless. As information is available easily to everyone so it is quite essential to shield secretive data. This paper focuses on encrypting videos using confusion and diffusion at various levels. Chaotic skew tent map and nested piecewise linear chaotic map which are categorized under piecewise linear maps have been used for the processing. Two skew tent maps are cross coupled with each other to generate random values. The binary sequences are generated by comparing the outputs of the cross coupled piecewise linear chaotic maps. The generated binary sequence is used for bit level diffusion. Further, pixels are shuffled to provide higher level of encryption. The ciphered video is of the same size as that of plain video. The proposed scheme is of low complexity and provides high level encryption. The security analysis of the technique has been carried out and better results have been found regarding the statistical and differential attacks. The code development has been done in MATLAB and the scheme is applicable in areas like Video Encryption, Steganography and Digital Watermarking on various lightweight devices.
Keywords: video processing, multimedia encryption, chaotic maps, lightweight device security
Published in RUNG: 01.04.2021; Views: 1914; Downloads: 0
This document has many files! More...

23.
Design and analysis of new shuffle encryption schemes for multimedia
Rajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article

Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis
Published in RUNG: 01.04.2021; Views: 1931; Downloads: 0
This document has many files! More...

24.
BAT algorithm for improving fuzzy C-means clustering for location allocation of rural kiosks in developing countries under e-governance
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Rural Kiosks are important infrastructural pillar in rural regions for internet and basic technology facility all around the world. They are also known as Tele-centers or Common Service Centers and are majorly used by government to promote Electronic Governance. The major characteristic of setting up of Rural Kiosk is their appropriate location so that people from rural region can avail the services at minimum travel cost and time. There are lot of traditional schemes used by researchers in past for location allocation but this paper proposes the usage of Fuzzy C-Means clustering and BAT algorithm to optimize the location of Rural Kiosk. The meta-heuristic approach has produced better results as compared to normal graph theories in past. The experiment has been conducted on a random data set of 72 village locations from India and their clusters are formed. It is found that using only Fuzzy C-Means clustering to allocate the center and by using it in combination with BAT algorithm produced up to 25% of efficient results. This can drastically help the key stakeholders in allocation of these Rural Kiosks at right places so as to maximize their utility.
Keywords: BAT algorithm, location allocation, rural kiosks, fuzzy C-means, e-governance, tele-centers, common service centers
Published in RUNG: 01.04.2021; Views: 1903; Downloads: 0
This document has many files! More...

25.
Implementation & analysis of integrated utility system in developing nation like India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Public utility systems are prevalent around the world but are struggling in developing nations like India to work efficiently. Integration of different utilities can be a possible solution on the technology front, so that more requests can be handled with lesser problems. This study provides the implementation design and benefits of an already proposed integration system by the same authors. It is found that Data Storage, Access Time, Transaction Cost, security cost and server’s busy time can become more effective if the implementation of integration system can be put in place. The working prototype is based on three utilities (Gas, Power & Water) of Delhi-NCR, India.
Keywords: information systems, utility system, India, developing nation
Published in RUNG: 01.04.2021; Views: 1935; Downloads: 56
URL Link to full text
This document has many files! More...

26.
Binary division fuzzy C-means clustering and particle swarm optimization based efficient intrusion detection for e-governance systems
Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: With the rapid rise of technology, many unusual and unwanted patterns have been observed in the communication network andrespective systems. This may be attributed to the increase of external threats that cause many security concerns. Such anomalies and unusual behavior lead to a strong need of studying and designing the Intrusion Detection Systems and Clustering. Currently,a variety of clustering methods and their combinations are used to develop an efficient intrusion detection system, but some metrics like low detection rate and high false alarm rate make these models unsatisfactory. The problem of local minima for clustering technique makes their search ability less efficient. An evolutionary technique called particle swarm optimization algorithm, that is based on swarm intelligence, shows a high global maxima search capability. In this paper, these two techniques have been combined to present a novel approach called fuzzy based particle swarm algorithm for the implementation of intrusion detection system. The experiment was conducted on a new data set called Kyoto data set with more number of anomalies. The obtained results were compared with two traditional clustering techniques based on K-Means and Fuzzy C-Means. It was observed that the proposed algorithm outperformed the other two traditional methods on the basis of the Detection Rate and False Alarm rate. In past some researchers have presented the combination of Fuzzy Based Particle Swarm Optimization algorithm to improve the intrusion detection rate,but this rate has been further improved because the algorithm performance depends on the termination condition and the fitness function value which are new in the proposed algorithm. Moreover, cluster numbers have been considered differently in the past, whereas the proposed algorithm works only on binary clustering.
Keywords: intrusion detection, fuzzy C-means clustering, particle swarm optimization, detection rate, e-governance
Published in RUNG: 01.04.2021; Views: 1893; Downloads: 0
This document has many files! More...

27.
A study on cause related marketing: antecedents and consequents in relation to purchase intention of consumers in Delhi, India
Saibal K. Pal, 2017, original scientific article

Abstract: The study examines the antecedents and consequents of Cause Related Marketing (CRM) and its impact on the purchase intention of consumers directly and indirectly. The aim of the study is to understand the impact of CRM activities on the company and its brand and analyze its influence on the purchase intention of consumers. To fulfill the objectives, descriptive research with sample of 415 consumers has been used. Data is collected with the help of semi-structured questionnaires in Delhi-NCR, India from January-June 2016. To determine sample, convenience sampling is used and analysis is done using statistical techniques such as Correlation, Regression and ANOVA. The finding of the study reveals that sponsorship, market orientation and awareness of events contribute in effective implementation of cause related marketing. Also CRM influences consumer attitude, brand loyalty and corporate reputation. CRM activities were found to have a significant impact on purchase intention of consumers. Also, the findings imply that women related and anti-trafficking issues must be adopted as the central theme for CRM activities to attract more consumers to participate in the campaign. Organizations that intent to increase purchase intention of consumers can do it through Cause Related Marketing campaigns and can understand the antecedents that make CRM a successful activity with the help of this study. The study has paid attention towards conceptualization of CRM and examining the impact of various antecedents and consequences of CRM. Such exhaustive research framework has not been developed and tested by prior studies which novel in current research.
Keywords: cause related marketing, purchase intention, sponsorship, corporate credibility, market orientation, brand loyalty, consumer attitude
Published in RUNG: 01.04.2021; Views: 1937; Downloads: 0
This document has many files! More...

28.
Converting apprehensive customers to willing customers : building trust in online shopping arena
Saibal K. Pal, 2017, original scientific article

Abstract: This study focuses on knowing about the factors that can affect the trust levels of the consumers involved in online shopping. Trust has been identified as a prominent factor that ultimately leads to the transformation of the apprehensive customers into willing customers. The role of website design features and portal affiliation is tested regarding their impact in affecting the trusting beliefs of the customers. Structural Equation Modeling (SEM) was put to use to do the statistical testing on the data collected through students of tier III city of India. The results showed that the website design features have an important role to play in affecting the trusting beliefs of the people whereas portal affiliation didn’t have much of a role. The study implies that the website managers must focus on their design features if they want to gain the trust of their customers. The portal affiliation wouldn’t be fruitful in the case of a student at least. Better shoppers amongst students must be attracted towards portals through innovative designs and features.
Keywords: online shopping, building trust, website design features, portal affiliation, structural equation modelling, theory of reasoned action
Published in RUNG: 01.04.2021; Views: 1796; Downloads: 0
This document has many files! More...

29.
Meta-heuristic algorithms to improve fuzzy C-means and K-means clustering for location allocation of telecenters under e-governance in developing nations
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2019, original scientific article

Abstract: The telecenter, popularly known as the rural kiosk or common service center, is an important building block for the improvement of e-governance in developing nations as they help in better citizen engagement. Setting up of these centers at appropriate locations is a challenging task; inappropriate locations can lead to a huge loss to the government and allied stakeholders. This study proposes the use of various meta-heuristic algorithms (particle swarm optimization, bat algorithm, and ant colony optimization) for the improvement of traditional clustering approaches (K-means and fuzzy C-means) used in the facility location allocation problem and maps them for the betterment of telecenter location allocation. A dataset from the Indian region was considered for the purpose of this experiment. The performance of the algorithms when applied to traditional facility location allocation problems such as set-cover, P-median, and the P-center problem was investigated, and it was found that their efficiency improved by 20%–25% over that of existing algorithms.
Keywords: ant colony optimization, bat algorithm, common service center, e-governance, fuzzy clustering, meta-heuristic algorithm, particle swarm optimization
Published in RUNG: 01.04.2021; Views: 1931; Downloads: 10
URL Link to full text
This document has many files! More...

30.
Regional e-governance development index for developing nations
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2020, original scientific article

Abstract: E-governance has proven to be instrumental in the expansion and evolution of how governments interact with and deliver services to their citizens. The United Nations (UN) E-Governance Development Index (EGDI) is the most widely used metric for assessment of e-governance development; however, this metric is not appropriate for assessment at the regional level, especially for developing nations. Therefore, the authors have studied various factors in the context of developing nations, such as the Online Availability and Performance Index, Telecommunications Index, Human Capital Index, E-governance-related Infrastructure Index, and E-governance Performance Index, with the aim of analyzing the success and implementation rate of e-governance activities across the different regions of a developing nation like India. The results showed that the UN's EGDI is not suitable for assessment at a regional level and that adding new components to the model helps to achieve better results for around 30% of the regions under study. The rankings, which were calculated through the new model and compared against other standard indices, obtained good correlations, proving the validity of the new model. India, as a developing nation, was the region selected for the experimental work. Central governments, state governments, investors, stakeholders, and government consultants can obtain benefits through this research.
Keywords: e-governence, India, e-governance development index
Published in RUNG: 01.04.2021; Views: 1883; Downloads: 47
URL Link to full text
This document has many files! More...

Search done in 0.06 sec.
Back to top