Options
Jasmine K S
Loading...
Preferred name
Jasmine K S
Official Name
Jasmine K S
Main Affiliation
R V College of Engineering
Email
Scopus Author ID
24476266900
12 results
Now showing 1 - 10 of 12
- PublicationCrime Data Analysis and Prediction(2022)
;Ritisha D ;Pooja RCrimes against women have created a negative impact on society both socially and economically. The Law is facing numerous challenges while trying to prevent crimes against women. Crimes against women are rapidly growing in India and it is a big threat to humanity. In every part of India, women face various issues such as kidnapping, domestic violence, acid attacks, rapes, etc. The crime data analytic system will be able to analyze and predict the rate of crimes happening in various states in India by using machine learning algorithms such as linear regression and random forest classifiers. By using this web application, the user will know the statistics and occurrence of crimes in one particular state with the data visualization done on the dataset available. � Grenze Scientific Society, 2022. - PublicationIdentification of suitable metrics for reuse oriented software products using the methods of attribute relevance analysis(2006)As software engineering matures into true engineering discipline, there is an increasing need for a corresponding maturity in repeatability, assessment and measurement of artifacts associated with software [1]. Deriving a measure for reusability of software components has proven to be challenging task now a days. This paper aims at identifying the suitable metrics for measuring reuse achievements and artifacts (components) used in the software industry by surveying hundred software companies. My work focused on one of the commonly used methods of attribute relevance analysis, namely information gain analysis. Experiments are conducted with two categories of metrics (general metrics and component metrics) and the result shows a means to develop a set of six dimensions that describe suitability of reuse metrics in the case of first category and four dimensions in the case of second category for predicting reuse success.
- PublicationSecurity management in mobile cloud computing: Security and privacy issues and solutions in mobile cloud computing(2018)
;Singh BMobile cloud computing is a technique or model in which mobile applications are built, powered and hosted using cloud computing technology. In Mobile Cloud computing we can store information regarding sender, data and receiver on cloud through mobile application. As we store more and more information on cloud by client, security issue will arise. This chapter presents a review on the mobile cloud computing concepts as well as security issues and vulnerabilities affecting Cloud Systems and the possible solutions available to such issues within the context of cloud computing. It also describes the pros and cons of the existing security strategy and also introduces the existing issues in cloud computing such as data integrity, data segregation, and security. � 2018 by IGI Global. All rights reserved.Scopus© Citations 1 - PublicationRisk based thinking and contingency modeling in leadership and administration for quality management in higher education(2020)Risk based thinking is the core aspect to avoid or reduce the undesired effects and promote continual improvement for any organization, especially in the field of higher education. Preventive action becomes an automatic process when a management system is risk-based. The contingency approach to management will make fruitful results once it is considered as more explicit and builds it into strategic plan of the management system with upfront planning with the help of business models. In the strategic plan of any organization, leadership and administration plays an important role. By identifying the context related risks, leaders can analyze the opportunities in terms of impact and feasibility and plan towards prioritizing the risks to act on. In this direction, the need for a business model which focuses on efficient process-based approach towards risk prioritization, thereby prevention and avoidance is proposed, which demonstrates management their leadership, and commitment to the quality management of higher education. � 2021, IGI Global.
- PublicationBusiness transformation though cloud computing in sustainable business(2014)
; Sudha M.The changing market trends make it mandatory for businesses to constantly innovate and improve while keeping the expenditures at lowest. For any business, irrespective of size, information technology is playing a major role. Cloud computing is emerging as a driving factor for all types of businesses. Although cloud computing is widely recognized as a technology transformer, its potential for driving business innovation is not exploited to the fullest. Cloud computing promises to decrease capital expenditures and offer higher utilization rates on existing hardware. To exploit the cloud computing capability to enable organizations to enhance their revenue streams and improved customer relationships while increasing business agility, organizations need to determine how best to employ cloud enabled business models that promote sustainable competitive advantage, as this chapter discusses. By completely leveraging cloud computing opportunities, organizations can focus on process improvement by driving inefficiencies out of repeatable processes and providing agility to reuse elements of business logic. � 2015 by IGI Global. All rights reserved.Scopus© Citations 4 - PublicationSecure end-to-end authentication for mobile banking(2015)
;Singh BThe advancement in technology makes Mobile Banking transaction more sophisticated. The OTP SMS is generated by the bank server and is handed over to the client�s mobile subscriber. To avoid any possible attacks like phishing and other attacks, the OTP must be secured. In order to provide reliable and secure mobile transactions without any compromise to convenience, a reliable m-banking authentication scheme that combines the secret PIN with encryption of the one-time password (OTP) has been developed in this paper. The secured OTP while using eZeeMPay salt algorithm seek to give the more secured m-banking transaction. After the encrypted OTP SMS reaches the client�s mobile, the OTP is used again used for decrypting. The plain OTP text should be sent back to the bank will verified at the server to complete the transaction initiated. The combination of OTP with secured OTP provides authentication and security. � Springer International Publishing Switzerland 2015.Scopus© Citations 1 - PublicationA new architecture of mobile payment system through social media network(2014)
;Singh BThe financial services industry is changing rapidly as a result of advances in information technology, telecommunications and the Internet. Technological innovations and increasing customer demand have led to the emergence of new services and new organizational forms for financial services firms. The gait of innovation in the Social media, the payment system is staggering. The biggest social media sites are Facebook, massive and used by almost everyone, Twitter, the micro-blogging, and LinkedIn, the online professional networking site. By using the social media connections as a method to exchange the funds, we can integrate our use of mobile wallets, PayPal, etc. to our social media sites. Believing on daily deal platforms, none of the current daily deal platforms can compete with the granularity and relevance with which banks could target a deal to a specific subscriber, having access to their extensive spending history and preferences. A feedback loop extending from the Bank to the merchants enabling the creation of accurate list of customers who consistently spend in specific retail categories can help merchants in delivering targeted offers to attract new customers. � 2014, IGI Global.Scopus© Citations 1 - PublicationNon-functional Testing-Based Framework for Developing Reliable IoT Products(2021)The statistics on worldwide IoT-connected devices predicts that the number of IoT devices will rise up to 60 billion by 2025. To meet the advancement which can ensure a competitive global Success and can promote continual improvement, Internet of Things (IoT) devices play an important role. One of the most recent changes in the communication technology is the paradigm shift from traditional systems to software-driven ones. In this context, IoT provides plenty of opportunities to pioneer new products and influence interconnected systems with large scalability. IoT-driven intelligent devices that are capable of performing automatic updates are very much required in the present scenario. Main problems with the companies building these devices are that non-functional aspects of these devices which will lead to device-related security risks were not given much importance. So as a result, device manufacturers have to take into considerations of various non-functional aspects when designing their products such as security, safety, scalability, reliability and performance. This paper proposes a layered IoT framework with a focus on non-functional testing aspects in order to enable the organizations to demonstrate themselves in leveraging the maximum potential in developing smarts products and stability in their business performance. � 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
- PublicationComparative study on various methods and types of mobile payment system(2012)
;Singh BThe mobile payment is the one of the most promising future applications in the domain of mCommerce. Different approaches come to the market and try to address existing needs, but up to day no global solution exists. The proposed system would enhance the P2P (SMS Based) mobile Payment system, which will try to ease the money transfer between two individual. This solution the key difference is the time needed to inform the beneficiary about the completion of the payment. The advantage of such a system is that only the mobile phone number, not the bank account number or credit card details, are transmitted. Moreover, consumers can even request a proposed system's phone number if they do not feel comfortable giving their mobile phone number to merchants. Therefore, proposed system tries to improve the customer's trust and payment security. � 2012 IEEE.Scopus© Citations 11 - Publication