Authentication and behavior monitoring in an online vote Polling system using middleware Security
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 6
Abstract
An online vote polling system conduct by government of our country should not believe any third party software and utility program which are running in operating system of server. In server machine, a large scale software system is used to handle the large amount of overload conditions and a lot of HTTP requests and responses. As well as there is a chance of activation of residual faults which are escape from software testing phases and intentional faults can decrease the performance and increases the system downtime with huge costs. Most existing OS-Level anomaly detection techniques are based on static and worse thresholds or on lengthy profiling phases. So, these are not well-suited for systems subject to highly variable and nonstationary operating conditions. Hence, the core concept of proposed system is implementing both application security and system security for a specific web application can increase the reliability, security and robust. Application security encompasses with lot of vulnerable attacks on web application like remote code execution, SQL Injection and cross site scripting. System security includes various dynamic threshold values for non-stationary variables of all active processes and file system. Thus a strong reliable and robust vote polling system is proposed here.
Authors and Affiliations
Rajasoundaran. S, Narayanasamy. P, Jeevakumar. R.
Patch Antenna using Metamaterial Structure for improving parameters on 3.2 layers At 2.787 GHz
In this paper, a novel printed rectangular patch antenna with 3.2 layer, resonant at 2.787 GHz frequency, is proposed. The given antenna is composed of a rectangular patch antenna with retangular structure on 3.2 layers...
Analysis of Telecommunication Data: Call Drop
Today, cellular phones are the most commonly used wireless technology. Cellular phones are so common that it can be seen in everyone’s hand whether it is old, young or teenagers. It is used for communication with each o...
Vibration Analysis of Spur Gear- FEA Approach
Gears are used for a wide range of industrial applications. They have varied application starting from textile to aviation industries. They are the most common means of transmitting power. They change the rate of rotati...
A Review: 3D Image Reconstruction From Multiple Images
In this paper we proposed a method to construct a 3D image from the multiple images. We will take two or more image from different angle of a object and then we will construct 3D image with the help of those images. Whe...
A Novel Work for Improving Security and Challenges using Fuzzy Logic Approach in VANETS
Vehicular AdHoc networks are the most emerging technologies in now-a-days. VANETs have many challenges like security and time latency when users are travelling in the roadways. There are many techniques available to ove...