Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


1 - 10 / 21
First pagePrevious page123Next pageLast page
1.
Dynamic route map generation scheme for mobiles : M-governance application framework for tourism & travel in Delhi, India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: Easiness of public & tourist's travel within a city is an important task for central and State Government. They have to access a combination of public transport options like metros, trams, buses and private options like cabs services and hired vehicles. Delhi, being the capital city of India, enjoys the usage of public transport by millions of travelers. Currently all route information on mobile applications (be it public or private) are static in nature which does not recommend any route to follow. This paper proposes such an application where travelling gets easier based on real time route map generation for using public transport like Bus and Metro services. The client-server based 3-tier architecture has been used for the mobile application designing. The application scores high on ease of travelling and customization of the routes through recommendations as compared to static application.
Keywords: M-governance, dynamic route map, Delhi tourism, public transport system, mobile application framework
Published in RUNG: 16.07.2021; Views: 3024; Downloads: 151
URL Link to full text
This document has many files! More...

2.
Analysing security checkpoints for an integrated utility-based information system
Sunil K. Muttoo, Rajan Gupta, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: With the rising digital medium, the various digital applications are rising too. These applications can work in the private domain or public domain depending upon the environment and features. Of late, the public infrastructure in India is improving and thus digitisation of the services and processes are making it better for the government to function. Lots of new services and applications are planned through desktop-and mobile-based information systems. But any information system requires a good security cover for it to function correctly and efficiently. One such new system was proposed for integrating the various utility systems in Delhi, NCR, for which various security checkpoints are discussed in this paper. These are related to database security, network security, cryptography, and the user authentication process. These checkpoints will be helpful in making the newly proposed information system more secure and will also be helpful in analysing the need and scope of new security features in it. Security concerns are analysed at different levels of the information system and suggestions are made for the system which can be implemented in the currently proposed system. These suggestions can also be used in other similar systems as well as for improving and enhancing security at various levels.
Keywords: information systems, integrated utility system, database security, network security, data security, information system security, e-governance
Published in RUNG: 15.07.2021; Views: 2867; Downloads: 11
URL Link to full text
This document has many files! More...

3.
Design & analysis of clustering based intrusion detection schemes for e-governance
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, published scientific conference contribution

Abstract: The problem of attacks on various networks and information systems is increasing. And with systems working in public domain like those involved under E-Governance are facing more problems than others. So there is a need to work on either designing an altogether different intrusion detection system or improvement of the existing schemes with better optimization techniques and easy experimental setup. The current study discusses the design of an Intrusion Detection Scheme based on traditional clustering schemes like K-Means and Fuzzy C-Means along with Meta-heuristic scheme like Particle Swarm Optimization. The experimental setup includes comparative analysis of these schemes based on a different metric called Classification Ratio and traditional metric like Detection Rate. The experiment is conducted on a regular Kyoto Data Set used by many researchers in past, however the features extracted from this data are selected based on their relevance to the E-Governance system. The results shows a better and higher classification ratio for the Fuzzy based clustering in conjunction with meta-heuristic schemes. The development and simulations are carried out using MATLAB.
Keywords: particle swarm optimization, intrusion detection, anomaly detection, intrusion detection system, network intrusion detection
Published in RUNG: 02.04.2021; Views: 2935; Downloads: 10
URL Link to full text
This document has many files! More...

4.
Proposed framework for information systems security for e-governance in developing nations : assessment and way ahead for key components
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, published scientific conference contribution

Abstract: E-Governance is rising rapidly in various parts of the world. And with rising digitization of the resources, the threats to the infrastructure and digital data is also rising within the government departments. For developed nations, the security parameters and optimization process is well placed but for developing nations like India, the security parameter is yet to be addressed strongly. This study proposes a framework for security assessment amongst E-Governance departments based on Information System principles. The major areas of security to be covered up are towards Hardware, Network, Software, Server, & Data security, Physical Environment Security, and various policies for security of Information Systems at organizational level.
Keywords: e-governance, information systems security, developing nations, security framework
Published in RUNG: 02.04.2021; Views: 2712; Downloads: 63
URL Link to full text
This document has many files! More...

5.
Development of e-governance in an emerging economy like India : assessment and way ahead for key components
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, published scientific conference contribution

Abstract: In this paper, we describe the key research questions handled during the doctoral work done in the area of E-Governance. The five research questions in the study are related to the concepts like Development of E-Governance & its assessment, Infrastructure management to reach out to maximum citizens, Various types of Security concerns faced during the E-Governance Development, Analyzing the E-Governance transaction pattern to capture citizen's interest, and finally the way ahead for the E-Governance development through the route of efficiency and optimization in the service designing. The methodology adopted and results obtained for various research questions are discussed at high level. Some portion of the current work is still in progress.
Keywords: e-governance, location allocation, common service centers, intrusion detection system, security, analytics
Published in RUNG: 02.04.2021; Views: 2768; Downloads: 58
URL Link to full text
This document has many files! More...

6.
The need of a development assessment index for e-governance in India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2017, published scientific conference contribution

Abstract: The purpose of this paper is to discuss and argue on the need of an assessment framework for the development of E-Governance services & practices in various states of India. This can be used to compare the states against each other so as to evaluate their status as per the national & international standards. The study is exploratory in nature as it develops arguments over an Index based on combination of theory, past literature and international reports w.r.t. E-Governance services and associated available infrastructure. It considers research papers from 2000-2015 and major reports on E-Governance after 2006. The need to develop an index based on different parameters is identified. The major areas to be covered up in the development index are online availability and performance of E-Governance service, telecommunication infrastructure, human capital, infrastructure availability and electronic participation by the citizens. Other areas are security and ease of access of the services. Development Index formulation will suggest that the development status for various Indian states, w.r.t. E-Governance, is based on lot of factors like the geographical location, demographic distribution, quality of human resources, and infrastructure present. A state merely having large number of E-Governance services does not become an automatic choice of best state for E-Governance development in the country. The state should be able to justify the overall development rather than being beneficial to just a small section of its population. Indian national E-Governance plan needs to assess the weak zones of the country so as to take initiatives to upgrade them and bid for overall higher ranking in the E-Governance Development Index of United Nations. There is no overall quantitative assessment framework available for E-Governance development in India as of now. So this research is novel with respect to E-Governance development and its assessment.
Keywords: e-governance, national e-governance plan, e-governance development, Indian states assessment policy
Published in RUNG: 02.04.2021; Views: 2670; Downloads: 52
URL Link to full text
This document has many files! More...

7.
BAT algorithm for improving fuzzy C-means clustering for location allocation of rural kiosks in developing countries under e-governance
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Rural Kiosks are important infrastructural pillar in rural regions for internet and basic technology facility all around the world. They are also known as Tele-centers or Common Service Centers and are majorly used by government to promote Electronic Governance. The major characteristic of setting up of Rural Kiosk is their appropriate location so that people from rural region can avail the services at minimum travel cost and time. There are lot of traditional schemes used by researchers in past for location allocation but this paper proposes the usage of Fuzzy C-Means clustering and BAT algorithm to optimize the location of Rural Kiosk. The meta-heuristic approach has produced better results as compared to normal graph theories in past. The experiment has been conducted on a random data set of 72 village locations from India and their clusters are formed. It is found that using only Fuzzy C-Means clustering to allocate the center and by using it in combination with BAT algorithm produced up to 25% of efficient results. This can drastically help the key stakeholders in allocation of these Rural Kiosks at right places so as to maximize their utility.
Keywords: BAT algorithm, location allocation, rural kiosks, fuzzy C-means, e-governance, tele-centers, common service centers
Published in RUNG: 01.04.2021; Views: 2710; Downloads: 0
This document has many files! More...

8.
Implementation & analysis of integrated utility system in developing nation like India
Rajan Gupta, Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: Public utility systems are prevalent around the world but are struggling in developing nations like India to work efficiently. Integration of different utilities can be a possible solution on the technology front, so that more requests can be handled with lesser problems. This study provides the implementation design and benefits of an already proposed integration system by the same authors. It is found that Data Storage, Access Time, Transaction Cost, security cost and server’s busy time can become more effective if the implementation of integration system can be put in place. The working prototype is based on three utilities (Gas, Power & Water) of Delhi-NCR, India.
Keywords: information systems, utility system, India, developing nation
Published in RUNG: 01.04.2021; Views: 2667; Downloads: 57
URL Link to full text
This document has many files! More...

9.
Binary division fuzzy C-means clustering and particle swarm optimization based efficient intrusion detection for e-governance systems
Sunil K. Muttoo, Saibal K. Pal, 2016, original scientific article

Abstract: With the rapid rise of technology, many unusual and unwanted patterns have been observed in the communication network andrespective systems. This may be attributed to the increase of external threats that cause many security concerns. Such anomalies and unusual behavior lead to a strong need of studying and designing the Intrusion Detection Systems and Clustering. Currently,a variety of clustering methods and their combinations are used to develop an efficient intrusion detection system, but some metrics like low detection rate and high false alarm rate make these models unsatisfactory. The problem of local minima for clustering technique makes their search ability less efficient. An evolutionary technique called particle swarm optimization algorithm, that is based on swarm intelligence, shows a high global maxima search capability. In this paper, these two techniques have been combined to present a novel approach called fuzzy based particle swarm algorithm for the implementation of intrusion detection system. The experiment was conducted on a new data set called Kyoto data set with more number of anomalies. The obtained results were compared with two traditional clustering techniques based on K-Means and Fuzzy C-Means. It was observed that the proposed algorithm outperformed the other two traditional methods on the basis of the Detection Rate and False Alarm rate. In past some researchers have presented the combination of Fuzzy Based Particle Swarm Optimization algorithm to improve the intrusion detection rate,but this rate has been further improved because the algorithm performance depends on the termination condition and the fitness function value which are new in the proposed algorithm. Moreover, cluster numbers have been considered differently in the past, whereas the proposed algorithm works only on binary clustering.
Keywords: intrusion detection, fuzzy C-means clustering, particle swarm optimization, detection rate, e-governance
Published in RUNG: 01.04.2021; Views: 2779; Downloads: 0
This document has many files! More...

10.
Internet traffic surveillance & network monitoring in India : case study of NETRA
Rajan Gupta, Sunil K. Muttoo, 2016, original scientific article

Abstract: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Keywords: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Published in RUNG: 01.04.2021; Views: 2706; Downloads: 56
URL Link to full text
This document has many files! More...

Search done in 0.04 sec.
Back to top