The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADELEAP
and Android to provide a robust, secure, user friendly solution.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
IMPLEMENTATION OF SASF CRAWLER BASED ON MINING SERVICESIAEME Publication
As we know there are multiple users and they access various websites and every website contains multiple web pages. It is difficult for the users to find a document that is equal to their needs. Users browse their request by submitting their queries to any search engine like Google or Yahoo and it is has been found that most of the results given by the search engines are irrelevant most of the time. Web crawlers are most of the important components used by a search engine that collects web pages from the web. It is not easy for a crawler to download specific web pages. The ontology, created from the browsing history, was then parsed for the entered search query from users and the corresponding results were returned to the user providing a semantically organized and relevant output. An ontology-based web crawler uses ontological concepts for improving its performance. So it will be easy for the users to get relevant data what as per the user search request. We have focused on self-adaptive semantic focused crawler, SeSM and StSM algorithm.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
The Identification Level of Security, usability and Transparency Effects on T...Waqas Tariq
This paper presents an Expert E-Commerce Trust System (EECTS), showing a possibility to confidence e-business processes by Adaptive Neuro-Fuzzy Inference Systems. The research has empirically tested the critical factors that influence an individual’s decision in the process of buying products or services online. The proposed model applies Adaptive Neuro-Fuzzy model to converging business processes to get the desired results. The system is adaptive since it uses neural network learning ability for its adaptation. The results of this study show that the security, web site design and familiarity, directly influence user’s trust in e-businesses since these factors lie the closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase. The study also provides a device for sellers to improve their commercial websites. The data was collected via interviews, surveys and B2C websites. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the model. New method was compared with previous Expert E-Commerce Trust System (EECTS) that developed by Fuzzy Logic system too.
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
A Smart Receptionist Implementing Facial Recognition and Voice InteractionCSCJournals
The purpose of this research is to implement a smart receptionist system with facial recognition and voice interaction using deep learning. The facial recognition component is implemented using real time image processing techniques, and it can be used to learn new faces as well as detect and recognize existing faces. The first time a customer uses this system, it will take the person’s facial data to create a unique user facial model, and this model will be triggered if the person comes the second time. The recognition is done in real time and after which voice interaction will be applied. Voice interaction is used to provide a life-like human communication and improve user experience. Our proposed smart receptionist system could be integrated into the self check-in kiosks deployed in hospitals or smart buildings to streamline the user recognition process and provide customized user interactions. This system could also be used in smart home environment where smart cameras have been deployed and voice assistants are in place.
IMPLEMENTATION OF SASF CRAWLER BASED ON MINING SERVICESIAEME Publication
As we know there are multiple users and they access various websites and every website contains multiple web pages. It is difficult for the users to find a document that is equal to their needs. Users browse their request by submitting their queries to any search engine like Google or Yahoo and it is has been found that most of the results given by the search engines are irrelevant most of the time. Web crawlers are most of the important components used by a search engine that collects web pages from the web. It is not easy for a crawler to download specific web pages. The ontology, created from the browsing history, was then parsed for the entered search query from users and the corresponding results were returned to the user providing a semantically organized and relevant output. An ontology-based web crawler uses ontological concepts for improving its performance. So it will be easy for the users to get relevant data what as per the user search request. We have focused on self-adaptive semantic focused crawler, SeSM and StSM algorithm.
Information security plays an important role in
governments. Its realm has been increased nowadays, especially
with resent viruses’ attacks in different governmental
organizations. The authentication is aspect of information
security, its current scheme used nowadays in the systems is
depend on the login by user name and password in addition to
one-time password or traditional secret questions, which in turn
is usually easy to predicate. This paper proposes enhanced
knowledge based authentication solution which ensures and
provides more security and usability levels for governmental
organizations.
The Identification Level of Security, usability and Transparency Effects on T...Waqas Tariq
This paper presents an Expert E-Commerce Trust System (EECTS), showing a possibility to confidence e-business processes by Adaptive Neuro-Fuzzy Inference Systems. The research has empirically tested the critical factors that influence an individual’s decision in the process of buying products or services online. The proposed model applies Adaptive Neuro-Fuzzy model to converging business processes to get the desired results. The system is adaptive since it uses neural network learning ability for its adaptation. The results of this study show that the security, web site design and familiarity, directly influence user’s trust in e-businesses since these factors lie the closest to the user and are deciding factors for the users and influence their decisions regarding transactions in e-commerce. These results can be of importance for vendors since they show how the customers perceive trust and which factors can directly influence their trust in a vendor and their experience with e-commerce and that the factors can play a deciding role on whether or not a customer will make a purchase. The study also provides a device for sellers to improve their commercial websites. The data was collected via interviews, surveys and B2C websites. Two questionnaires were used in this study. The first questionnaire was developed for e-commerce experts, and the second one was designed for the customers of commercial websites. Also, Expert Choice is used to determine the priority of factors in the first questionnaire, and MATLAB and Excel are used for developing the Fuzzy rules. Finally, the Fuzzy logical kit was used to analyze the generated factors in the model. New method was compared with previous Expert E-Commerce Trust System (EECTS) that developed by Fuzzy Logic system too.
Anomaly Threat Detection System using User and Role-Based Profile Assessmentijtsrd
In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the users behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy
SEARCH FOR ANSWERS IN DOMAIN-SPECIFIC SUPPORTED BY INTELLIGENT AGENTSijcsit
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
For an identification system like aadhaar, privacy is a very vital part of the system and UIDAI must make modifications in its current system using advanced technologies of cybersecurity to make the system more robust and secure. The system of aadhaar should be made more technology dependent rather than human intervention to prevent the system from fraudulent practices and eliminate the possibility of human error.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
Behavioural
biometrics is a scien
tific study with the primary purpose of identifying the authenticity of a
user based on the way they interact with an authentication mechanism. While Association based password
authentication is a cognitive model of authentication system.
The work done shows the implementation of Keyboard Latency technique for Authentication,
implementation of Association Based Password authentication and comparison among two. There are
several forms of behavioural biometrics such as voice analysis, signat
ure verification, and keystroke
dynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method not
only for user verification, but also for identification as well. The work presented in this model borrows
ideas from th
e bioinformatics literature such as position specific scoring matrices (motifs) and multiple
sequence alignments to provide a novel approach to user verification and identification within the context
of a keystroke dynamics based user authentication system
. Similarly Cognitive approach can be defined in
many ways of which one is association based Technique for authentication
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...Universita della Calabria,
Slides of the manuscript Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, Giancarlo Fortino, Maria Ganzha, Marcin Paprzycki, Costin Badica, and Mirjana Ivanovic. IDC 2017. Slides author: Claudio Savaglio
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
Search for answers in specific domains is a new milestone in question answering. Traditionally, question answering has focused on general domain questions. Thus, the most relevant answers (or passages) are selected according to the type of question and the Named Entities included in the possible answers. In this paper, we present a novel approach on question answering over specific (or technical) domains. This proposal allows us to answer questions such as “What article is appropriate for … “, “What are the articles related to … “, these kind of questions cannot be answered by a general question answering system. Our approach is based on a set of laws of a specific domain, which contain a large set of laws regarding the work organized into a hierarchy. We consider generic concepts such as “article” semantic categories. Our results on the corpus of Federal Labor Law show that this approach is effective and highly reliable.
Comparative Study on Intrusion Detection Systems for Smartphonesiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
For an identification system like aadhaar, privacy is a very vital part of the system and UIDAI must make modifications in its current system using advanced technologies of cybersecurity to make the system more robust and secure. The system of aadhaar should be made more technology dependent rather than human intervention to prevent the system from fraudulent practices and eliminate the possibility of human error.
— in distributed computing environment, Mobile agents
are mobile autonomous processes which operate on behalf of
users (e.g., the Internet). These applications include a specialized
search of a middleware services such as an active mail system,
large free-text database, electronic malls for shopping, and
updated networking devices. Mobile agent systems use less
network bandwidth, increase asynchrony among clients and
servers, dynamically update server interfaces and introduce
concurrency. Due to software components, security of mobile
agent is essential in any mobile agent based application. Security
services such as Confidentiality, Integrity, Authentication,
Authorization and Non-Repudiation are discussed and combat
with by the researchers. This work is proposing a new technique
for access control area of security for the mobile agents and it
will be implemented using an example of shopping cart data
sharing for multiple levels.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
Behavioural
biometrics is a scien
tific study with the primary purpose of identifying the authenticity of a
user based on the way they interact with an authentication mechanism. While Association based password
authentication is a cognitive model of authentication system.
The work done shows the implementation of Keyboard Latency technique for Authentication,
implementation of Association Based Password authentication and comparison among two. There are
several forms of behavioural biometrics such as voice analysis, signat
ure verification, and keystroke
dynamics. In this study, evidence is presented indicating that keystroke dynamics is a viable method not
only for user verification, but also for identification as well. The work presented in this model borrows
ideas from th
e bioinformatics literature such as position specific scoring matrices (motifs) and multiple
sequence alignments to provide a novel approach to user verification and identification within the context
of a keystroke dynamics based user authentication system
. Similarly Cognitive approach can be defined in
many ways of which one is association based Technique for authentication
Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, ...Universita della Calabria,
Slides of the manuscript Agent-Based Computing in the Internet of Things: a Survey. Claudio Savaglio, Giancarlo Fortino, Maria Ganzha, Marcin Paprzycki, Costin Badica, and Mirjana Ivanovic. IDC 2017. Slides author: Claudio Savaglio
In the EXISTING SYSTEM, Ballot
based Voting is present, but still there is no system to
avoid Proxy Casting and Recasting is implemented.
We do not have an option to see our casted Vote also.
There is no security in this current application. In the
PROPOSED SYSTEM, a novel electronic voting
system based on Blockchain that addresses some of
the limitations in existing systems and evaluates some
of the popular blockchain frameworks for the purpose
of constructing a blockchain-based e-voting system.
In the MODIFICATION part of the project, we
integrate Aadhaar card linked mobile number for
OTP generation, only then the voter can cast the vote,
this system prevents casting and re-casting of proxies.
JOB SEARCH SYSTEM IN ANDROID ENVIRONMENTAPPLICATION OF INTELLIGENT AGENTSijistjournal
The Job selection process in today’s global economy can be a daunting task for prospective employees no matter their experience level. It involves a detailed search of newspapers, job websites, human agents, etc, to identify an employment opportunity that is perceived compatible to abilities, anticipated remuneration and social needs. Search sites such as Seek, Academickeys.com, Careerbuilder.com, Job-hunt.org, Monster.com, etc allow prospective employees to register online and search and apply for employment. However most do very little to profile employers against employees or even attempt to confirm the validity of the data submitted by prospective employees. Also no information exists on feedback of the employer too on various criteria submitted by employees. Taking all these into consideration we here have proposed an intelligent agent (instead of the human agent) to perform the same search operations by interacting with the employer and job search coordinator agents. The proposed solution would involve the creation of an applicant, job search and employer agents that would use fuzzy preference rules to make a proper decision in getting a list of jobs based on the user’s search criteria and also feed the rating of the employer based on feedback submitted by the past & current employees which is unique and first of its kind. All results applicable are organized based on a dynamic calculation of expected utility from highest to lowest and displayed as the job search listing. The system would use ANDROID 2.2, JADE-LEAP and the Google API to provide a robust, user friendly solution.
ENMG 602 Homework Assignment 1 Problem 1 Observation.docxkhanpaulita
ENMG 602 Homework Assignment 1
Problem 1:
Observations of the demand for a spare part stocked at a parts supply depot during the
calendar year 2012 were
Month Demand Month Demand
January 95 July 234
February 62 August 284
March 135 September 221
April 211 October 281
May 199 November 192
June 276 December 302
a. Determine the one-step-ahead forecasts for the demand for January 2013 using 3-,
6-, and 12-month moving averages.
b. Using a four-month moving average, determine the one-step-ahead forecasts for
July through December 2012.
c. Compute MAD, MSE, MAPE for the forecasts obtained in b.
Problem 2:
Observed weekly sales of ball peen hammers at the town hardware store over a ten-week
period have been 13, 11, 26, 21, 32, 13, 21, 22, 30, and 26.
a. Suppose that five-week moving averages are used to forecast sales. Determine the
one-step-ahead forecasts for weeks 6 through 10.
b. Suppose that exponential smoothing is used with a smoothing constant of α =
0.15. Find the exponential smoothing forecasts for weeks 6 through 10 (start the
forecasting process from week 1).
c. Based on the MAD, which forecast method is better?
Problem 3:
The sales of a tablet computer in a popular electronic store during the calendar year 2012
were
Month Demand Month Demand
January 103 July 199
February 119 August 208
March 131 September 221
April 149 October 237
May 172 November 252
June 184 December 268
a. Using 3-month simple moving average and exponential smoothing (with α = 0.10
and 0.20), determine the one-step-ahead forecasts for July 2012 through January
2013.
ENMG 602 Homework Assignment 1
b. Using 3-month double moving average (using base level and trend), determine the
one-step-ahead forecasts for July 2012 through January 2013.
c. Compute MAD, MSE, and MAPE for the above forecasts.
d. Based on the MAPE, which forecast method is the best?
Problem 4:
Compile a list of major system life-cycle activities. For each activity on the list, try to
find the related supply chain activities. Present your finding in a table with the system
life-cycle stage in the first column, system life-cycle activities in the second column and
the related supply chain activities in the third column.
CYBER SECURITY IN E-BUSINESS
1
CYBER SECURITY IN E-BUSINESS
2
Cyber Security in E-Business
Abstract
Technological advancement has resulted in the significant simplicity of carrying out activities and processes in many areas. The business world has attained a significant benefit from this advancement. Through it, e-businesses have emerged, where individuals and organizations can electronically carry out business activities, thus without the need to be physically present at the point and time of transacting. According to Furnell (2004), e-business refers to a model of doing business or a segment of a larger model that allows commercial transactions to be undertaken througho.
Online job placement system project report.pdfKamal Acharya
Our project Expert.Com Job Placement System has been designed to help the millions of unemployed youth to get in touch with the major companies which would help them in getting the right kind of jobs and would also help the companies to get the appropriate candidates for appropriate jobs.
Bringing AI into the Enterprise: A Machine Learning Primermercatoradvisory
New research from Mercator Advisory Group shows how machine learning, a.k.a. AI, has changed consumer behavior and expectations and will evolve to alter all aspects of bank operations. AI’s impact on banking will be broader and faster than the impact of the internet.
International conference on business e recruitmentibalakumar
E-recruitment is integration and utilization of internet technology to improve efficiency and effectiveness of recruitment process. E-recruitment Provides HR and Recruiters with the toolsTechnology and the capacity to deliver time and costeffective resourcing. E-recruitment can be importanttool in making organizational needs by providinginformation regarding potential hires.This paper deals with the Importance of e-recruitment in terms of cost, time and qualityefficiency in Indian Organizations /in Currentscenario. So this paper concludes with some globalE-Recruitment service providers as well as itemphasizes on the need of adopting such system byIndian Organization
In this article, there will be a discussion about on-demand job portal app development, its importance and its requirements in the job market. This article will offer you in-depth information related to recruitment job portal app development.
A Survey of Building Robust Business Models in Pervasive ComputingOsama M. Khaled
Pervasive computing is one of the most challenging and difficult computing domains nowadays. It includes many architectural challenges like context awareness, adaptability, mobility, availability, and scalability. There are currently few approaches which provide methodologies to build suitable architectural models that are more suited to the nature of the pervasive domain. This area still needs a lot of enhancements in order to let the software business analyst (BA) cognitively handle pervasive applications by using suitable tasks and tools. Accordingly, any proposed research topic that would attempt to define a development methodology can greatly help BAs in modeling pervasive applications with high efficiency. In this survey paper we address some of the most significant and current software engineering practices that are proving to be most effective in building pervasive systems.
For citation:
Osama M. Khaled and Hoda M. Hosny. A Survey of Building Robust Business Models in Pervasive Computing. An accepted paper in the 2014 World Congress in Computer Science Computer Engineering and Applied Computing
Its an Online Job Portal..
it was our BE Project..
u can view it on http://jobportal.akshay.uco.im/
if is case you want our project or the contents just mail me on ajay.maurya24@yahoo.in
Similar to BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB APPLICANTS (20)
ANALYSIS OF EXISTING TRAILERS’ CONTAINER LOCK SYSTEMS IJCSEIT Journal
Trailers carry large containers to various destinations in the world. These are manually locked on to
trailers as they move through these long distances. Security mainly refers to the safety of a state,
organization, property, and individuals against criminal activity. The study was made to analyze the
existing trailer locks and the insecurity being experienced currently. The study also focused on creating a
background to building an automated lock system for auto-mobiles. Findings showed that there are various
container types like the General Purpose containers, the Hard-Top containers and the Open-Top among
others. Similarly, the twist locks were the ones revised for this study. The study also discussed the
weaknesses of the twist locks, most especially the non-notification on unsecured locks. This causes leads to
accidents and wastage of lives and property. The study finally proposed an automated lock system to
overcome these weaknesses to some good extent.
A MODEL FOR REMOTE ACCESS AND PROTECTION OF SMARTPHONES USING SHORT MESSAGE S...IJCSEIT Journal
The smartphone usage among people is increasing rapidly. With the phenomenal growth of smartphone
use, smartphone theft is also increasing. This paper proposes a model to secure smartphones from theft as
well as provides options to access a smartphone through other smartphone or a normal mobile via Short
Message Service. This model provides option to track and secure the mobile by locking it. It also provides
facilities to receive the incoming call and sms information to the remotely connected device and enables the
remote user to control the mobile through SMS. The proposed model is validated by the prototype
implementation in Android platform. Various tests are conducted in the implementation and the results are
discussed.
FACE RECOGNITION USING DIFFERENT LOCAL FEATURES WITH DIFFERENT DISTANCE TECHN...IJCSEIT Journal
A face recognition system using different local features with different distance measures is proposed in this
paper. Proposed method is fast and gives accurate detection. Feature vector is based on Eigen values,
Eigen vectors, and diagonal vectors of sub images. Images are partitioned into sub images to detect local
features. Sub partitions are rearranged into vertically and horizontally matrices. Eigen values, Eigenvector
and diagonal vectors are computed for these matrices. Global feature vector is generated for face
recognition. Experiments are performed on benchmark face YALE database. Results indicate that the
proposed method gives better recognition performance in terms of average recognized rate and retrieval
time compared to the existing methods.
BIOMETRICS AUTHENTICATION TECHNIQUE FOR INTRUSION DETECTION SYSTEMS USING FIN...IJCSEIT Journal
Identifying attackers is a major apprehension to both organizations and governments. Recently, the most
used applications for prevention or detection of attacks are intrusion detection systems. Biometrics
technology is simply the measurement and use of the unique characteristics of living humans to distinguish
them from one another and it is more useful as compare to passwords and tokens as they can be lost or
stolen so we have choose the technique biometric authentication. The biometric authentication provides the
ability to require more instances of authentication in such a quick and easy manner that users are not
bothered by the additional requirements. In this paper, we have given a brief introduction about
biometrics. Then we have given the information regarding the intrusion detection system and finally we
have proposed a method which is based on fingerprint recognition which would allow us to detect more
efficiently any abuse of the computer system that is running.
PERFORMANCE ANALYSIS OF FINGERPRINTING EXTRACTION ALGORITHM IN VIDEO COPY DET...IJCSEIT Journal
A video fingerprint is a recognizer that is derived from a piece of video content. The video fingerprinting
methods obtain unique features of a video that differentiates one video clip from another. It aims to identify
whether a query video segment is a copy of video from the video database or not based on the signature of
the video. It is difficult to find whether a video is a copied video or a similar video, since the features of the
content are very similar from one video to the other. The main focus of this paper is to detect that the query
video is present in the video database with robustness depending on the content of video and also by fast
search of fingerprints. The Fingerprint Extraction Algorithm and Fast Search Algorithms are adopted in
this paper to achieve robust, fast, efficient and accurate video copy detection. As a first step, the
Fingerprint Extraction algorithm is employed which extracts a fingerprint through the features from the
image content of video. The images are represented as Temporally Informative Representative Images
(TIRI). Then, the second step is to find the presence of copy of a query video in a video database, in which
a close match of its fingerprint in the corresponding fingerprint database is searched using inverted-filebased
method. The proposed system is tested against various attacks like noise, brightness, contrast,
rotation and frame drop. Thus the performance of the proposed system on an average shows high true
positive rate of 98% and low false positive rate of 1.3% for different attacks.
Effect of Interleaved FEC Code on Wavelet Based MC-CDMA System with Alamouti ...IJCSEIT Journal
In this paper, the impact of Forward Error Correction (FEC) code namely Trellis code with interleaver on
the performance of wavelet based MC-CDMA wireless communication system with the implementation of
Alamouti antenna diversity scheme has been investigated in terms of Bit Error Rate (BER) as a function of
Signal-to-Noise Ratio (SNR) per bit. Simulation of the system under proposed study has been done in M-ary
modulation schemes (MPSK, MQAM and DPSK) over AWGN and Rayleigh fading channel incorporating
Walsh Hadamard code as orthogonal spreading code to discriminate the message signal for individual
user. It is observed via computer simulation that the performance of the interleaved coded based proposed
system outperforms than that of the uncoded system in all modulation schemes over Rayleigh fading
channel.
FUZZY WEIGHTED ASSOCIATIVE CLASSIFIER: A PREDICTIVE TECHNIQUE FOR HEALTH CARE...IJCSEIT Journal
In this paper we extend the problem of classification using Fuzzy Association Rule Mining and propose the
concept of Fuzzy Weighted Associative Classifier (FWAC). Classification based on Association rules is
considered to be effective and advantageous in many cases. Associative classifiers are especially fit to
applications where the model may assist the domain experts in their decisions. Weighted Associative
Classifiers that takes advantage of weighted Association Rule Mining is already being proposed. However,
there is a so-called "sharp boundary" problem in association rules mining with quantitative attribute
domains. This paper proposes a new Fuzzy Weighted Associative Classifier (FWAC) that generates
classification rules using Fuzzy Weighted Support and Confidence framework. The naïve approach can be
used to generating strong rules instead of weak irrelevant rules. where fuzzy logic is used in partitioning
the domains. The problem of Invalidation of Downward Closure property is solved and the concept of
Fuzzy Weighted Support and Fuzzy Weighted Confidence frame work for Boolean and quantitative item
with weighted setting is generalized. We propose a theoretical model to introduce new associative classifier
that takes advantage of Fuzzy Weighted Association rule mining.
GENDER RECOGNITION SYSTEM USING SPEECH SIGNALIJCSEIT Journal
In this paper, a system, developed for speech encoding, analysis, synthesis and gender identification is
presented. A typical gender recognition system can be divided into front-end system and back-end system.
The task of the front-end system is to extract the gender related information from a speech signal and
represents it by a set of vectors called feature. Features like power spectrum density, frequency at
maximum power carry speaker information. The feature is extracted using First Fourier Transform (FFT)
algorithm. The task of the back-end system (also called classifier) is to create a gender model to recognize
the gender from his/her speech signal in recognition phase. This paper also presents the digital processing
of a speech signals (pronounced “A” and “B”) which are taken from 10 persons, 5 of them are Male and
the rest of them are Female. Power Spectrum Estimation of the signal is examined .The frequency at
maximum power of the English Phonemes is extracted from the estimated power spectrum. The system uses
threshold technique as identification tool. The recognition accuracy of this system is 80% on average.
DETECTION OF CONCEALED WEAPONS IN X-RAY IMAGES USING FUZZY K-NNIJCSEIT Journal
Scanning baggage by x-ray and analysing such images have become important technique for detecting
illicit materials in the baggage at Airports. In order to provide adequate security, a reliable and fast
screening technique is needed for baggage examination.This paper aims at providing an automatic method
for detecting concealed weapons, typically a gun in the baggage by employing image segmentation method
to extract the objects of interest from the image followed by applying feature extraction methods namely
Shape context descriptor and Zernike moments. Finally the objects are classified using fuzzy KNN as illicit
or non-illicit object.
META-HEURISTICS BASED ARF OPTIMIZATION FOR IMAGE RETRIEVALIJCSEIT Journal
The proposed approach avoids the semantic gap in image retrieval by combining automatic relevance
feedback and a modified stochastic algorithm. A visual feature database is constructed from the image
database, using combined feature vector. Very few fast-computable features are included in this step. The
user selects the query image, and based on that, the system ranks the whole dataset. The nearest images are
retrieved and the first automatic relevance feedback is generated. The combined similarity of textual and
visual feature space using Latent Semantic Indexing is evaluated and the images are labelled as relevant or
irrelevant. The feedback drives a feature re-weighting process and is routed to the particle swarm
optimizer. Instead of classical swarm update approach, the swarm is split, for each swarm to perform the
search in parallel, thereby increasing the performance of the system. It provides a powerful optimization
tool and an effective space exploration mechanism. The proposed approach aims to achieve the following
goals without any human interaction - to cluster relevant images using meta-heuristics and to dynamically
modify the feature space by feeding automatic relevance feedback.
ERROR PERFORMANCE ANALYSIS USING COOPERATIVE CONTENTION-BASED ROUTING IN WIRE...IJCSEIT Journal
In Wireless Ad hoc network, cooperation of nodes can be achieved by more interactions at higher protocol
layers, particularly the MAC (Medium Access Control) and network layers play vital role. MAC facilitates
a routing protocol based on position location of nodes at network layer specially known as Beacon-less
geographic routing (BLGR) using Contention-based selection process. This paper proposes two levels of
cross-layer framework -a MAC network cross-layer design for forwarder selection (or routing) and a
MAC-PHY for relay selection. Wireless networks suffers huge number of communication at the same time
leads to increase in collision and energy consumption; hence focused on new Contention access method
that uses a dynamical change of channel access probability which can reduce the number of contention
times and collisions. Simulation result demonstrates the best Relay selection and the comparative of direct
mode with the cooperative networks. And also demonstrates the Performance evaluation of contention
probability with Collision avoidance.
M-FISH KARYOTYPING - A NEW APPROACH BASED ON WATERSHED TRANSFORMIJCSEIT Journal
Karyotyping is a process in which chromosomes in a dividing cell are properly stained, identified and
displayed in a standard format, which helps geneticist to study and diagnose genetic factors behind various
genetic diseases and for studying cancer. M-FISH (Multiplex Fluorescent In-Situ Hybridization) provides
color karyotyping. In this paper, an automated method for M-FISH chromosome segmentation based on
watershed transform followed by naive Bayes classification of each region using the features, mean and
standard deviation, is presented. Also, a post processing step is added to re-classify the small chromosome
segments to the neighboring larger segment for reducing the chances of misclassification. The approach
provided improved accuracy when compared to the pixel-by-pixel approach. The approach was tested on
40 images from the dataset and achieved an accuracy of 84.21 %.
Steganography is the technique of hiding a confidential message in an ordinary message and the extraction
of that secret message at its destination. Different carrier file formats can be used in steganography.
Among these carrier file formats, digital images are the most popular. For this work, digital images are
used. Here steganography is done on the skin portion of an image. First skin portion of an image is
detected. Random pixels are selected from that detected region using a pseudo-random number generator.
The bits of the secret message will be embedded on the LSB of these random pixels. An analysis is done to
check the efficiency and robustness of the proposed method. The aim of this work is to show that
steganography done using random pixel selection is less prone to outside attacks.
A NOVEL WINDOW FUNCTION YIELDING SUPPRESSED MAINLOBE WIDTH AND MINIMUM SIDELO...IJCSEIT Journal
In many applications like FIR filters, FFT, signal processing and measurements, we are required (~45 dB)
or less side lobes amplitudes. However, the problem is usual window based FIR filter design lies in its side
lobes amplitudes that are higher than the requirement of application. We propose a window function,
which has better performance like narrower main lobe width, minimum side lobe peak compared to the
several commonly used windows. The proposed window has slightly larger main lobe width of the
commonly used Hamming window, while featuring 6.2~22.62 dB smaller side lobe peak. The proposed
window maintains its maximum side lobe peak about -58.4~-52.6 dB compared to -35.8~-38.8 dB of
Hamming window for M=10~14, while offering roughly equal main lobe width. Our simulated results also
show significant performance upgrading of the proposed window compared to the Kaiser, Gaussian, and
Lanczos windows. The proposed window also shows better performance than Dolph-Chebyshev window.
Finally, the example of designed low pass FIR filter confirms the efficiency of the proposed window.
CSHURI – Modified HURI algorithm for Customer Segmentation and Transaction Pr...IJCSEIT Journal
Association rule mining (ARM) is the process of generating rules based on the correlation between the set
of items that the customers purchase.Of late, data mining researchers have improved upon the quality of
association rule mining for business development by incorporating factors like value (utility), quantity of
items sold (weight) and profit. The rules mined without considering utility values (profit margin) will lead
to a probable loss of profitable rules.
The advantage of wealth of the customers’ needs information and rules aids the retailer in designing his
store layout[9]. An algorithm CSHURI, Customer Segmentation using HURI, is proposed, a modified
version of HURI [6], finds customers who purchase high profitable rare items and accordingly classify the
customers based on some criteria; for example, a retail business may need to identify valuable customers
who are major contributors to a company’s overall profit. For a potential customer arriving in the store,
which customer group one should belong to according to customer needs, what are the preferred functional
features or products that the customer focuses on and what kind of offers will satisfy the customer, etc.,
finds the key in targeting customers to improve sales [9], which forms the base for customer utility mining.
AN EFFICIENT IMPLEMENTATION OF TRACKING USING KALMAN FILTER FOR UNDERWATER RO...IJCSEIT Journal
The exploration of oceans and sea beds is being made increasingly possible through the development of
Autonomous Underwater Vehicles (AUVs). This is an activity that concerns the marine community and it
must confront the existence of notable challenges. However, an automatic detecting and tracking system is
the first and foremost element for an AUV or an aqueous surveillance network. In this paper a method of
Kalman filter was presented to solve the problems of objects track in sonar images. Region of object was
extracted by threshold segment and morphology process, and the features of invariant moment and area
were analysed. Results show that the method presented has the advantages of good robustness, high
accuracy and real-time characteristic, and it is efficient in underwater target track based on sonar images
and also suited for the purpose of Obstacle avoidance for the AUV to operate in the constrained
underwater environment.
USING DATA MINING TECHNIQUES FOR DIAGNOSIS AND PROGNOSIS OF CANCER DISEASEIJCSEIT Journal
Breast cancer is one of the leading cancers for women in developed countries including India. It is the
second most common cause of cancer death in women. The high incidence of breast cancer in women has
increased significantly in the last years. In this paper we have discussed various data mining approaches
that have been utilized for breast cancer diagnosis and prognosis. Breast Cancer Diagnosis is
distinguishing of benign from malignant breast lumps and Breast Cancer Prognosis predicts when Breast
Cancer is to recur in patients that have had their cancers excised. This study paper summarizes various
review and technical articles on breast cancer diagnosis and prognosis also we focus on current research
being carried out using the data mining techniques to enhance the breast cancer diagnosis and prognosis.
FACTORS AFFECTING ACCEPTANCE OF WEB-BASED TRAINING SYSTEM: USING EXTENDED UTA...IJCSEIT Journal
Advancement in information system leads organizations to apply e-learning system to train their employees
in order to enhance its performance. In this respect, applying web based training will enable the
organization to train their employees quickly, efficiently and effectively anywhere at any time. This
research aims to extend Unified Theory of Acceptance and Use Technology (UTAUT) using some factors
such flexibility of web based training system, system interactivity and system enjoyment, in order to explain
the employees’ intention to use web based training system. A total of 290 employees have participated in
this study. The findings of the study revealed that performance expectancy, facilitating conditions, social
influence and system flexibility have direct effect on the employees’ intention to use web based training
system, while effort expectancy, system enjoyment and system interactivity have indirect effect on
employees’ intention to use the system.
PROBABILISTIC INTERPRETATION OF COMPLEX FUZZY SETIJCSEIT Journal
The innovative concept of Complex Fuzzy Set is introduced. The objective of the this paper to investigate
the concept of Complex Fuzzy set in constraint to a traditional Fuzzy set , where the membership function
ranges from [0, 1], but in the Complex fuzzy set extended to a unit circle in a complex plane, where the
member ship function in the form of complex number. The Compressive study of mathematical operation of
Complex Fuzzy set is presented. The basic operation like addition, subtraction, multiplication and division
are described here. The Novel idea of this paper to measure the similarity between two fuzzy relations by
evaluating δ -equality. Here also we introduce the probabilistic interpretation of the complex fuzzy set
where we attempted to clarify the distinction between Fuzzy logic and probability.
ALGORITHMIC AND ARCHITECTURAL OPTIMIZATION OF A 3D RECONSTRUCTION MEDICAL IMA...IJCSEIT Journal
This paper presents an optimization of an FPGA circuit implementation of 3D reconstruction algorithm of
medicals images. It is based on an algorithmic specification in the shape of a Factorized and Conditioned
Data Dependences Graph (GFCDD). An automatic and optimized implementation of the algorithm of «
Marching Cubes » has been carried out. The repetitive property of the algorithm has been exploited, as
much as possible, by means of the methodology “Adequacy Algorithm Structures”.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Dr.Costas Sachpazis
Terzaghi's soil bearing capacity theory, developed by Karl Terzaghi, is a fundamental principle in geotechnical engineering used to determine the bearing capacity of shallow foundations. This theory provides a method to calculate the ultimate bearing capacity of soil, which is the maximum load per unit area that the soil can support without undergoing shear failure. The Calculation HTML Code included.
Industrial Training at Shahjalal Fertilizer Company Limited (SFCL)MdTanvirMahtab2
This presentation is about the working procedure of Shahjalal Fertilizer Company Limited (SFCL). A Govt. owned Company of Bangladesh Chemical Industries Corporation under Ministry of Industries.
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
BIOMETRIC APPLICATION OF INTELLIGENT AGENTS IN FAKE DOCUMENT DETECTION OF JOB APPLICANTS
1. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
DOI : 10.5121/ijcseit.2012.2108 75
BIOMETRIC APPLICATION OF INTELLIGENT
AGENTS IN FAKE DOCUMENT DETECTION OF JOB
APPLICANTS
Salathiel Bogle1
and Suresh Sankaranarayanan2
1
Mona Institute of Applied Science, University of West Indies, Kingston, Jamaica
salbogleprogmer@gmail.com
2
Department of Computing, University of West Indies, Kingston, Jamaica
pessuresh@hotmail.com
ABSTRACT
The Job selection process in today’s globally competitive economy can be a daunting task for prospective
employees no matter their experience level. Although many years of research has been devoted to job
search and application resulting in good integration with information technology including the internet and
intelligent agent-based architectures, there are still many areas that need to be enhanced. Two such areas
include the quality of jobs associated with applicants in the job search by profiling the needs of employers
against the needs of prospective employees and the security and verifications schemes integrated to reduce
the instances of fraud and identity theft. The integration of mobile, intelligent agent, and cryptography
technologies provide benefits such as improved accessibility wirelessly, intelligent dynamic profiling, and
increased security. With this in mind we propose the intelligent mobile agents instead of human agents to
perform the Job search using fuzzy preferences which is been published elsewhere and application
operations incorporating the use of agents with a trust authority to establish employer trust and validate
applicant identity and accuracy. Our proposed system incorporates design methodologies to use JADE-
LEAP and Android to provide a robust, secure, user friendly solution.
KEY WORDS: M-commerce, Agents, Cryptography, JADE-LEAP, Android
1. INTRODUCTION
In today’s global economy, the challenges associated with finding a suitable job is amplified by
the technicalities associated with the Job search process which is seen by experience. Normally
when we want to apply for a job, we search the newspapers; listen to radio and television
broadcasts that may advertise vacancies and also job seekers register themselves with job site
portals such as Academickeys.com, Monster.com, Careerbuilder.com and so on. Many employers
do not register themselves with these mediums to provide full details of the job specifications but
instead post important details on their own website only. Also with the growing number of online
job search engines, segmenting the online labor market into “information islands”, make it almost
impossible for job seekers to get an overview of all relevant positions [1]. Thus feasible
approaches to improve navigation in job offers and protect the applicant’s identity are not only
important but they are necessary to help users find job offers more effectively [2]. For many
employers, the monetary and non-monetary aspects of jobs are important determinants of the
2. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
76
number of applicants for jobs. Non-employed job applicants could have more difficulty in getting
a job interview than those currently employed but, once interviewed, may not face any further
difficulties in getting employment [3]. Therefore job application is a very competitive process in
which the applicant’s objectives includes successfully obtaining the job for the best negotiated
salary and the employer’s objectives includes selecting the most capable employee for the lowest
negotiated salary [3][4]. Today, the internet plays a major role in job search and application with
the launch of Online Career Center around 1993. Since then several mega job search sites have
come on stream with Monster.com, a semantic based job search site being one of the most
popular with over a million job postings at any time, 63 million job seekers per month in 2008
and over 150 million resumes[5].While it is attractive for site operators to encourage users to post
their resume and contact details online, job seekers need to exercise caution as they have no
control over where their resume will eventually be seen as their resume could potentially be
viewed by fraudsters who may use information from it to a mass and sell personal details or even
perpetrate identity theft [5][6]. Security is therefore very important in job application, and
knowing the identity of those whom you communicate with in virtual communities is essential for
understanding and establishing identity and the effects of identity deceptions and the conditions
that give rise to it [6]. It is indeed plausible that job applicants could easily fake identity or
achievements, unfairly positioning them in the job market. Also employers could be deceitful in
posting fictitious job postings as a scheme to defraud or mislead prospective applicants. With
these issues in mind, we will now look into intelligent agent technology and how agents can be
used towards job application system which is our proposed work. The paper is organized in
sections as follows. Section 2 provides details on Online Job search and Application systems with
motivation towards developing an Agent based Job Search system. Section 3 gives details on the
Intelligent Agent Technology followed by Agent based utility and Job Search theory. Section 4
talks on Intelligent Agent based Mobile Search system developed followed by Fingerprint
matching and Security Schemes. Section 5 talks on Agent based Secure Application System with
architecture details and algorithm. Section 6 gives the implementation details on JADE-LEAP
and Android 2.2. Section 7 is conclusion and future work.
2. ONLINE JOB SEARCH AND APPLICATION SYSTEMS
Job search and application is not a new area as several significant works have been done in
several key areas to modernize, improve security and increase the success and usage of these
systems. Some of the works that have inspired the conception of this research include:
‘Improving Job Search by network of professionals and companies’ research in which job
clusters were created to provide relationship between categories of professionals and company
needs and is based on a network of job offers, discovering interesting relationships between
them and clustering these to represent companies or professional. The output is a visualization
of the network of professions and companies [2].
The ‘Semantic Web-based’ recruitment research used the data exchange between employers,
applicants and job portals; and is based on a set of vocabularies in ontology which provide
shared terms to describe occupations, industrial sectors and job skills. Monster.com uses a
similar semantic web-based technology [1].
‘Agent-based Application for Supporting Job Matchmaking for Teleworkers’ is a multi-agent
system that performs job matchmaking in teleworking community focusing on the time
consuming task of searching for appropriate working partners [7]
Risk Aversion and Expected Utility theories which calibrate the relationship between risk
attitudes over small and large stakes when the expected utility hypothesis is maintained [8]
‘Open Source Java Framework for Biometric Web Authentication Based on BIOAPI’ which
provides interoperability between different software applications and devices by using the
BioAPI specification which allows software applications to communicate with a broad range
of biometric technologies [9]
3. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
77
Although these and other research have contributed to the implementation of several web based
and android applications including monster.com, seek.com, academickeys.com,
careerbuilder.com, LinkUp, HireADroid, etc., there is no work that support an agent based
architecture running on JADE and Android that is capable of providing utility based ordering of
jobs, dynamic employer rating over period, fuzzy job selection rules [10][11] and secure
biometric application with applicant and employer verification which is unique in our system. So
taking these into consideration we have developed the Intelligent Agent-based Mobile Job Search
and Secure Application system where details on Intelligent agent based Job search system will be
discussed in brief and been published elsewhere But before going into system developed we need
to review details on Intelligent Agents, Job search Theory, Agent based utility and security
considerations towards application system.
3. INTELLIGENT AGENT TECHNOLOGY
Over the years there has been much controversy about the definition of an artificial intelligent
agent [12]. There exists a weaker notion of agents and a stronger more controversial notion. [13]
define an agent as “anything that can be viewed as perceiving its environment through sensors
and acting upon that environment through effectors”. Hayes-Roth (1995) agrees with this
definition but adds additional clarity by stating that “intelligent agents continuously perform three
functions: perception of dynamic conditions in the environment; action to affect conditions in the
environment; and reasoning to interpret perceptions, solve problems, draw inferences and
determine actions”. Agents should autonomously carry out activities by being independent or
self-directed and should not depend on external input only from human operator or other agents
to act manifesting social abilities when interacting with other agents (and possibly humans) via
some kind of agent-communication language [12-15]
Today artificial intelligent agents are integrated into many computer-based systems including
expert systems, job search engines, web searches, info-bots and so on. These autonomous agents
can perform time consuming, mundane and sometimes even life endangering tasks reliably,
instead of the human agent [16]. [14] describes a stronger notion of agency in which agents
process characteristics such as knowledge, belief, intention and obligation. Other attributes
applies to stronger agent notion. These include mobility where agents move around an electronic
network, veracity where agents will not knowingly communicate false information and
benevolence where the assumption is that an agent will try to do what it is asked and will not
have conflicting goals [17]
3.1 Job Search Theory
In a dynamic labor market, the process by which people find new jobs has importance to
policymakers and scholars also. Policymakers have made attempts to design training and other
programs to help match an individual’s skills with the requirements of potential employers [18].
Job-search theory attempts to propose strategies for making optimal employment decisions by
considering factors that determine individual’s demands and their prospect for finding an
acceptable job offer [19][20]
Job search models are measured in both discrete and continuous time and a simple model can be
used to represent the basic search behavior of an unemployed worker where the intent is to
maximize expected utility [20]. This research focuses on Discrete Time Job search. In Discrete
Time Job search the individual is interested in choosing a policy (i.e. a sequence of decision
rules) that determines whether or not to accept any particular job offer. The eventuality of the job
offer is referred to as the outcome and is dependent on preferences of the searcher such as skills,
pay, location of the employment opportunity, and the willingness of the employer to employ the
4. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
78
searcher. The review of job search theory provides the basis for a discussion on agent-based
utility relevant to the job search process.
3.2 Agent-based Utility
In economics, utility functions are used to model preferences of agents. These functions serve as
a device for us to assign a single number to any bundle [21]. Proponents of Subjective Expected
Utility (SEU) theory have offered many axiomatisations of their models. One approach develops
utility and subjective probability as distinct concepts and provide explicit axioms which justify
the combination of these into an expected utility ranking of the strategies (options, actions,
prospects) before a decision maker [22]. In 1979 weighted utility theory was proposed by Chew
and MacCrimmon, and then refined by Chew [23]. Chew replaced the independence axiom with
weak independence and convexity axioms which led to a weighted linear representation [23].
Expected utility ‘u’ is a linear function on the simplex:
{p | p = (p1, p2 ,…, pn); ∑ pi = 1; ∀ I, pi ≥ 0}
A prospect (x1, p1; …; xn, pn) is a contract that yields outcome xi with probability pi based on the
linear function above. To simplify notation, we omit null outcomes and use (x, p) to denote the
prospect (x, p; 0, 1-p) that yields x with probability p and 0 with probability 1-p. The (riskless)
prospect that yields x with certainty is denoted by (x). Thus expectation to choose prospects is
based on
U(x1, p1; … ; xn, pn) = p1 u(x1) + … + pn u(xn).
That is, the overall utility of a prospect, denoted by U, is the expected utility of its outcomes
(Kahneman and Tversky 1979).
4. INTELLIGENT AGENT BASED MOBILE SEARCH SYSTEM
Although online job search sites have greatly improved the job acquisition process there are still
challenges in providing a qualitative approach to job search, providing a job best suited for an
employee. The main objective of the system developed [10][11] as shown in Fig.1 addresses the
following challenges:
• Intelligent agent (instead of human agent) to perform the job search operations by
interacting with employer and job search coordinator agents (Bogle & Suresh, 2011; Bogle
& Suresh, 2011).
• Agent based utility concept to provide suitability profiling based on configurable factors
such as distance from work, days and shift requirements, work environment, safety and
hazard considerations, remuneration, skillset, etc.
• Employ fuzzy preference rules, to make proper decision in getting a list of jobs
corresponding to the user desired specification.
• Enable past and current employees to profile employers based on configurable metrics
There are still some challenges in the system developed towards security concerns in the job
application process such as fraud and identity theft of Employee and Employer .So taking these
into consideration we here have proposed the application of Biometric – fingerprint matching
towards fraud and identity theft which is unique and first of its kind. But before going into the
details of system developed, we will review the Fingerprint matching and Security schemes.
5. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
79
Fig. 1 Job Search Flow Architecture
3.3 Fingerprint Matching
Fingerprints are graphical flow-like ridges present on human fingers [24][25]. The use of
fingerprint for identification has been around since 6000 BC. With the increase in small
fingerprint devices integrated in mobile devices, laptops, etc. at cheaper costs, it is expected that
the use of fingerprint for personal authentication and security will increase [26]. Fingerprint
identification is based on two premises: (i) fingerprint details are permanent – based on the
anatomy and morphogenesis of friction ridge skin, and (ii) fingerprints of an individual are
unique – the notion of fingerprint individuality has been widely accepted based on inspection by
experts of millions of fingerprints [27]. [28][29] states that fingerprint matching can be separated
formally into the categories of verification and identification. Verification is the comparison of a
claimant fingerprint against an enrollee fingerprint, where the intention is that the claimant
fingerprint matches the enrollee fingerprint. Identification is the matching of an unknown
fingerprint against a database of known and catalogued fingerprints to associate the fingerprint
with an identity. This is traditionally used in the domain of forensic criminology [26] In order to
perform matching it is critical that an understanding of the structure and features of the
fingerprint is obtained.
The lines that flow in various patterns across the fingerprint are called ridges and the spaces
between ridges are valleys. The more microscopic of approaches is called minutia matching. The
two types are ridge ending and bifurcation. An ending is a feature where a ridge terminates and a
bifurcation is a feature where a ridge splits from a single path to two paths at a Y-junction. For
minutiae matching purposes a minutia has a location(x, y) and direction (additional features are
also possible). Minutia matching, because of deformations in sensed fingerprints, is an elastic
matching of point patterns without knowing their correspondences beforehand. Generally, finding
the best match between two point patterns is intractable even if minutiae are exactly located and
no deformations exist between these two points. The existence of deformations makes the minutia
matching much more difficult. Correlation matching can also be used and is also called global
6. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
80
matching, simple image multiplication or image subtraction. Simplistically, the process can be
thought of as checking if the ridges correspond after aligning two fingerprints and subtracting
them [26][27]. Since fingerprints are permanent as discussed above, if they were intercepted
during communication or retrieved from an endpoint because of poor security, a perpetrator could
effectively fake their identity, pretending based on false biometrics. Therefore good security
schemes are extremely important to protect this biometric data.
3.4 Security Schemes and Considerations
Security is the attribute of a system to be safe against attacks or other interference [30][31]. Since
a person’s fingerprint is very sensitive data, it is very important that this biometric data be
protected by using cryptographic techniques [32].There are numerous cryptographic schemes and
algorithms available however this research is specifically interested in Certificate based
authentication and trust, HTTPS, and AES symmetric key encryption, discussed below.
X.509 certificate is a signed record that associates users’ identification with the cryptographic
keys and the framework postulates that everyone will obtain certificates from an official
certifying authority (CA) usually a Trusted Third Party (TTP). The public-key certificate consists
of a data part and a signature part. The data part consists of the name of an entity, the public keys
corresponding to that entity, and additional relevant information including the validity period for
the public key and so on. The signature part consists of the signature of a TTP over the data part
[33].
Hypertext transport protocol secure (HTTPS) is a technology where Secure Socket Layer (SSL)
or Transport Layer Security (TLS) is applied as a sub-layer over HTTP. HTTPS automatically
encrypts and decrypts data during communication transfer. SSL is designed to make use of TCP
to provide a reliable end-to-end secure service [34]. The two most important concepts of SSL are
the session and the connection. The specification defines these as follows:
• Connection: A connection is a transport that provides a suitable service, For SSL, such
connections are peer-to-peer relationships. The connections are transient. Every
connection is associated with a session [33][34]
• Session: An SSL session is an association between a client and a server. Sessions are
created by the Handshake Protocol. Sessions define a set of cryptography security
parameters, which can be shared among multiple connections. Sessions are used to avoid
the expensive negotiation of new security parameters for each connection [34][35]
The National Institute of Standards and Technology (NIST) worked with the cryptographic
community and developed and Advanced Encryption Standard (AES). The overall goal was to
develop a Federal Information Processing Standard (FIPS) that specifies an encryption algorithm
capable of protecting sensitive (unclassified) government information [36]. The Rijndael proposal
for AES was accepted by NIST and defined a cipher in which the block length and the key length
can be independently specified to 128, 192 or 256 bits. The AES specification uses the same three
key size alternatives but limit the block length to 128 bits. Rijndael was designed to have the
following characteristics:
• Resistance against all known attacks including Brute Force attacks
• Speed and code compactness on a wide range of platforms so that the use of the
algorithm is practical in a wide range of applications
• Design simplicity [34].
4 INTELLIGENT AGENT BASED BIOMETRIC IN SECURE APPLICATION
The literature reviewed confirms that the technologies exist to create a system that improves the
job search process using well founded techniques such as utility theorem applied to autonomous
7. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
81
agents, increased accessibility through the use of mobile technology and safeguards against fraud
and identity theft by using proven security encryption and biometric techniques such as
fingerprint matching, x509 certificates, and AES encryption [36]. This section provides a design
for the construction of such a system. The architecture shown in Fig 2, integrates critical
components to enable it to work effectively. A data enabled mobile network integrated with a
local area network (LAN) is the required platform. This enables efficient agent communication
between the mobile device and the multi-agent environment. All agents in the architecture were
designed to follow the FIPA2000 architecture for Agent Communication Language (ACL)
message passing in multi-agent systems and provide the protocol for managing agent interaction
and coordination [37].Let us now discuss the design roles and responsibilities of these
components in the architecture.
Fig. 2 Job Application Flow Architecture
The Intelligent agent based Secure Application design consists of the five intelligent agents and a
trusted third party. Let us now briefly consider these agents:
Applicant Agent (AA) - The applicant agent performs the activities of a human agent for job
search and application and is a key entity in the process. The Applicant Agent primary
responsibilities are:
i. Pre-populate relevant job application fields on user screen from registration data.
ii. Capture and encrypt biometric details for secure transfer over https.
iii. Securely submit over https, job application details including encrypted fingerprint and
signature.
iv. Liaise with security agent to check if employer is third party trusted and communicate
warning to user if employer is not, also giving them the option to abort the job
application if the user desires.
v. Report job application submission status and job application number for future reference.
Employer Agent (EA) –The employer agent models some actions and responsibilities
performed by the employer. The main activities are:
8. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
82
i. Interact with the Security Agent and Trusted Third Party in the employer verification
phase by providing valid certificates that are third party trusted as input for verification.
The employer trusted website certificate if from the known trusted third party, is
sufficient to mitigate costs.
ii. Sends job application details excluding biometrics as well as applicant education status
results to the human employer.
Security Agent (SA) – This agent is critical in the job application process and provides
confidentiality and some nonrepudiation by employing cryptographic functions to securely pass
data including biometric fingerprint and applicant signature from the applicant to the trusted
third party for verification. The security agent also communicates the job application status to
the AA and EA respectively and performs these functions:
i. Establish HTTPS SSL connection with the Applicant Agent for secure transfer of job
application data including biometric data.
ii. Establish secure https connection with trusted third party to verify employer certificates
using trusted third party APIs.
iii. Establish secure https connection with employer agent to obtain certificate for trust
verification.
iv. Receives applicant education status verification results and securely transfers over https
connection results to the applicant agent for presentation to the applicant.
v. Securely transfers applicant’s job application details with education status verification but
excluding applicant’s biometric data as a report to the employer agent for presentation to
the employer.
University Agent (UA) – This agent theoretically interacts on behalf of the university in the
verification process between the trusted third party and the university databases. Since each
university will have its own legal and security concerns, this abstraction is made to facilitate
varying degrees of limitations within the university that impacts the verification process. The
core responsibilities are:
i. Interact with the university database in accordance to university policy and procedures
relating to student’s confidentiality.
ii. Verify the identity of the trusted third party via its certificate to ensure it is not
communicating with a fake or unknown TTP.
iii. Securely liaise with the trusted third party to ensure only authorized applicant education
verification requests are processed.
iv. Keep a log audit of all such interactions for the university administration
Trusted Third Party (TTP) - The trusted third party for example VeriSign has the role of
securely interacting with the SA, EA and UA agents through certificate based trust schemes and
symmetric based encryption to validate biometric data, the existence of education credentials
where possible and verify the existence and trust or lack thereof of employers who post jobs to
the system. The following role is expected of the TTP:
i. Securely liaise via https with the security agent to securely obtain encrypted biometric
and education details for verification and validation.
ii. Securely liaise with the security agent via APIs to validate the employer certificates.
iii. Securely verify applicant identity by biometric data by using fingerprint matching
techniques.
iv. Securely liaise with the university agent to verify applicant’s education credentials.
9. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
83
4.1 Job Application Algorithm
The following steps outline the job application process from the system architecture shown in Fig
2 and 3. The flowchart of the process is shown in Fig 4:
• Applicant securely logs-in over https and clicks apply on a job selected from the search
process.
• The applicant agent then sends a message to the security agent who checks if the logged
in user has already applied for this job. If the applicant had previously applied, their
reference number is returned and presented along with a message that they have
previously applied and their application was submitted to the employer. The process then
stops.
• If the applicant had not previously applied for the job, the security agent liaises with the
employer agent and trusted third party APIs to verify if the employer is trusted. If
employer is untrusted, the applicant is alerted by the applicant agent and allowed to
decide on stopping or proceeding with the application process.
• The applicant agent auto-complete on the job application screens, some relevant data
such as applicant’s name, address, telephone, email, etc. from the registration process.
This information is editable and can be modified by applicant at any time.
• Applicant agent collects all inputs including captured biometric fingerprint and signature
data for submission over https.
• Biometric fingerprint and signature data are encrypted using public key AES 256bit or
128bit encryption depending on the capabilities of the mobile device prior to submission
over https.
• Applicant agent submits all inputs via https to the security agent.
• The security agent updates the databases with the application details.
• The security agent liaises with the trusted third party to verify applicant’s education
details.
• The trusted third party confirms if the employer is a trusted employer. If the employer is
untrusted, the trusted third party reports to the security agent that it is unable to perform
the requested checks for security reasons as the employer is not third party trusted and
stops the verification process.
• If the employer is trusted, the trusted third party then securely liaise with the university
agent over https to obtain university copy of applicant’s fingerprint and or signature data
and relevant summary education details in the format of full-name, year and award
obtained for each award obtained.
• The university agent can choose to respond with details or deny request based on strict
university policy, or if university is primarily paper base or do not have biometric data of
students.
• If the request is denied, the trusted third party will report to security agent that it is unable
to verify the applicant education details but with a reason of university does not permit.
• If the request is serviced, the trusted third party then decrypt and verify the applicant
biometric data to confirm if the reported awards from applicant are consistent with the
university records.
• If they do not match the trusted third party reports to security agent that it is not able to
verify the applicant biometric details or the education details. If they do match and are
verifiable, the trusted third party reports to the security agent that it is able to verify the
applicant’s biometric and education details.
• The security agent then communicates verification status very succinctly to the applicant
agent allowing for zero proof of knowledge as to reason for verification incase the
applicant may be fake or fraudulent.
10. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
84
• The security agent also communicates securely to the employer agent applicant details
and verification status and non-inflammatory or prejudicial reason for current status to
trusted employers only. No biometric data is transferred to the employer agent.
• The applicant agent then facilitates the presentation of this asynchronous communication
to the applicant comprising of applicant number and verification status without reason.
• The employer agent also sends an asynchronous communication to the employer of the
job application submitted by the applicant including job application reference number
and also verification status with reason to the trusted employer only.
Fig. 3 Security Flow Architecture
11. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
85
Fig. 4 Job Application Flow
The details on the implementation of the agents based on the architecture presented using
JADE-LEAP in Android 2.2 has been presented in Section 4 as screenshots.
5 IMPLEMENTATION USING JADE-LEAP
The system was implemented using java development kit 1.6.0_21 (jdk1.6.0_21) as the base
runtime environment using Eclipse Helios release build 20100617-1415 with android plug-in
12. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
86
enabled as the development IDE. JADE 4.0.1 was used for the Agent Platform [38] to host all
agents, control behavior and perform agent management. JADE-LEAP 4.0 was used to enable
agents on mobile devices [39], and Jade Android 1.0 enabled JADE-LEAP agents on Android
mobile devices [31]. Android 2.1 platform 8 with Google APIs SDK was used for the creation of
the Android application with Google Maps integration capabilities .The Bouncy Castle jdk16-145
lightweight JCE extensions for lightweight cryptography functions including symmetric
encryption, public key encryption, and certificate based authentication on Android mobile
devices, along with jdk1.6.0_21 Key tool were leveraged for the creation and signing of public
key certificates and for establishing the backbone of the system’s cryptographic security.
GRFingerJava 4.5 fingerprint matching API provided a means to simulate the fingerprint
matching facilities based on design architecture in Section 3 that could be used by the trusted
third party. Finally MySQL5.1 Database Server using MySQL Workbench 5.2CE was used to
create all databases for employer, university, job search & application and trusted third party.
The list of agents in the JADE environment is shown in Fig.5. The Applicant agent resides in a
separate split container and labeled with the mobile handset’s IMEI number. All other agents
reside in the main container and are identified by their abbreviated names.
Fig.5. Agents in JADE Container
5.1 Job Application Implementation
In order to apply for a job , an applicant must be securely signed in to the system over HTTPS
with a valid username and password as shown in Fig. 6.
13. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
87
Fig. 6 User Log-in Screen
The applicant demographic and biometric screens are configured as mandatory. Screens that
capture supplementary data useful for the applicant digital resume profile like his personal details,
Education, Work Experience etc are optional and can be updated at any time. Let us now consider
the activities involved in the secure job application process. In this section also there are several
scenarios possible from the design but let us discuss the following four (4) scenarios and their
screenshots.
1. Employer is third party trusted
2. Employer is not third party trusted
3. Applicant details were successfully verified
4. Applicant details could not be successfully verified.
5.1.1 Employer is third party trusted
An employer is considered third party trusted if and only if their company’s existence is validated
based on trusted certificates obtained from the trusted third party. For this system the trusted third
party is VeriSign. Fig. 7 shows the trust icon obtained by a verified employer after the Security
agent securely connects to the VeriSign over HTTPS and uses APIs to validate if the Employer
certificate obtained from the employer agent is still valid and was authentic and issued by same
trusted third party. Only trusted employers will trigger an applicant details validation by VeriSign
with the University.
14. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
88
Fig. 7 VeriSign trusted Employer
5.1.2 Employer is not third party trusted
If an employer does not have a valid certificate, for example their website certificate; or the
employer uses another trusted third party not supported by the system, the employer will not be
validated as third party trusted as shown in Fig.7. Applicants can still choose to submit their
applications securely to untrusted employers if they have some reason to trust these employers;
however a strong caution is given before allowing submission. This ensures legally that the
decision to give untrusted employer who could really be fake, access to their personal
demographic details only such as name, telephone, email, belongs only to the applicant.
Biometric data is never given directly to an employer and applicants cannot adjust this security
level via a configuration. On receiving the alert that the employer is untrusted, the applicant can
cancel the application process to protect their demographic data from unknown and fake
employers.
5.1.3 Building the Digital Resume
The system demonstrates data capture mechanism for customer demographics and additional
details, where portions of this data such as name, email address, telephone number, and so on is
auto-completed by the system from data captured in the registration process. All applicants must
provide the data to ensure that the employer has the most recent data on the applicant. The system
allows for the creation of an electronic resume. The sections currently captured by the system
include education details, work experience, hobbies, and references..
5.1.4 Acquiring and encrypting biometrics
No biometric data is stored on the applicant’s mobile to reduce the incident of biometric fraud in
the event the mobile device is stolen or used by multiple persons to access the system. A mobile
device with a front facing camera or fingerprint scanner is recommended. The system facilitates
the capture of a signature using the device touch screen and a stylus. The signature is then
encrypted using AES 128/256 bit encryption scheme as shown in Figs. 8 to 11. Since the
sensitivity of fingerprint data is not time bound, it is important that the fingerprint is captured,
15. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
89
scan quality verified, encrypted, and transferred over HTTPS with any cache removed from the
handset. Fig. 37 and 38 demonstrates the screens for capturing fingerprint from the device camera
and encrypting using AES 256bit encryption - recommended. A weaker AES 128 bit can be used
if the device cannot support the 256 bit encryption. All encryptions for signature and fingerprint
are automatically done when transitioning to the next screen if not yet encrypted by clicking on
the encrypt button.
Fig. 8 Applicant’s Signature Fig. 9 Encrypted signature
Fig. 10 Applicant’s Fingerprint Fig. 11 Encrypted fingerprint
6.1.5 Applicant details successfully verified
In this scenario, the employer is trusted, and the applicant made good effort to provide accurate
education, work experience and reference details. The security agent then securely connects over
16. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
90
HTTPS to the trusted third party VeriSign and provides biometric details along with relevant
demographics and education details to perform the applicant verification with the University
agent. VeriSign requests encrypted fingerprint and confirmation of education obtained for the
applicant from the University agent. The fingerprint is successfully matched and the degree
obtained was confirmed. Fig. 12 shows the message returned to the applicant including job
application number for reference and confirmation of details. Fig. 13 illustrates sample
communication sent to the Employer for the job application.
Fig. 12 Job Application Message to Applicant
17. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
91
Fig. 13 Job Application Sent to Employer
6.1.6 Applicant details could not be verified.
If the employer is not third party trusted, or the applicant fakes information, or the university does
not have proper databases with fingerprint, or do not allow trusted third party interaction with
university databases as a rule, the applicant details will not be verified. It is the responsibility of
the trusted third party to react gracefully and communicate these details to the security agent for
an appropriate action to be taken. In this instance, the applicant adds false education to their
electronic resume and the security agent engage the trusted third party to attempt verification of
the applicant and education details but the university agent was unable to find education details or
master degree award listed in resume and returns encrypted fingerprint and empty education
details. VeriSign verifies the fingerprint as the applicant’s fingerprint but cannot match the
education details and reports this to the security agent. Fig. 14 show the message displayed to the
applicant along with the job application number and Fig. 15 illustrates the communication sent to
the employer.
Fig. 14 Message sent to the applicant
18. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
92
Fig. 15 Employer receive application - Failed verification status
6 CONCLUSION & FUTURE WORK
To demonstrate the soundness of our proposed system, we developed a fully functional prototype
using JADE-LEAP running on Android, integrating Google Maps API, and lightweight JCE
security APIs to create our Applicant, Job Search, Security, Employer, and University Agents that
would securely communicate in a multi-agent environment and with an external third trusted
party via HTTPS and APIs to provide intelligence and services demonstrated in the screenshots
above. The system also determined if employers are trusted or not and how to verify applicants
and react using varied degrees of verification (fully verified, employer not trusted, university does
not have biometrics, records partially match, not verified and so on).The perceived drawbacks of
the system are the cost that could be associated with the use of trusted third party APIs for
employer certificate checks and also fingerprint verification. The reliance on the university to
provide applicant matching fingerprint data and education details, as some universities may not
willingly distribute student records, or even want to keep biometric details on students. The
Intelligent Agent-based Secure Application system can be improved by enhancement of
Employer interaction through mobile interfaces developed in Android. Extend android
application towards intelligent agent-based virtual secure job interview. This could form the
initial basis of a pre-interview before a face-to-face interview if needed to facilitate quick and
affordable interviews for applicants from different geographic locations for example and so on.
Last but not the least the statistical analysis of fake applicants can be recorded for mitigating such
problems in the society.
References
[1] Mochol, M et al(2007). "Improving the accuracy of job search with semantic techniques." Berlin,
Germany.
[2] Frivolt, G, and Maria B.(2006) Improving Job Search by Network of Professions and Companies.
Bratislava, Slovakia: Institute of Informatics and Software Engineering
[3] Manning, A. (1999) Pretty Vacant:Recruitment in Low-Wage Labour Markets. London: London
School of Economics and Political Science
[4] Mason, G (2000). "THE MIX OF GRADUATE AND INTERMEDIATELEVEL SKILLS IN
BRITAIN: WHAT SHOULD THE BALANCE BE?" Discussion Paper No. 16, page 11
[5] Wikipedia. 2011. http://en.wikipedia.org/wiki/Employment_website (accessed April 15, 2011).
[6] Donath, J S (1997). Identity and deception in the virtual community. California: Berkeley: University
of California Press
[7] Sugawara, K (2003) "Agent-Based Application for Supporting Job Matchmaking for Teleworkers."
Second IEEE International Conference on Cognitive Informatics (ICCI'03), pp. 137
19. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
93
[8] Rabin, M (1999). Risk Aversion and Expected-Utility Theory: A calibration Theory. Berkeley
California: Department of Economics
[9] Agulla, E at al(2007. An Open Source Java Framework for Biometric Web Authentication Based on
BioAPI. Vigo, Spain: Department of Signal Theory and Communications, University of Vigo
[10] Bogle, S and Suresh, S(2011a) . "Intelligent Agent based Job Search and Secured Application System
in Android Environment." , Proceedings of 2011 IEEE International conference on
Electro/Information Technology. Mankatto, Minesotta, USA.
[11] Bogle, S and Suresh, S(2011b) “Job Search system in Android Environment- Application of
Intelligent Agents”, Communciated to International Journal of Ubiquitous Computing and
Intelligence.
[12] Franklin, S, and Graesser, A(1996). " Is it an Agent, or just a Program?: A Taxonomy for
Autonomous Agents." Third International Workshop on Agent Theories Architectures and
Languages. Springer-Verlag.
[13] Russell, S J., and Norvig, P(1995). Artificial Intelligence: A Modern Approach. Englewood Cliffs,
NJ: Prentice Hall
[14] Jennings, N. R., and Wooldridge, M (1998). Applications of Intelligent Agents. London: University
of London.
[15] Hayes-Roth, B (1995). "An Architecture for Adaptive Intelligent Systems." Artificial Intelligence:
Special Issue on Agents and Interactivity, 329-365
[16] Poole et al (1998). Computational Intelligence. New York: Oxford University
[17] Spanoudakis,N and Pavlos M (2007). "An Ambient Intelligence Application Integrating Agent and
Service-Oriented Technologies." In Proceedings of SGAI Conference. Paris, France. pp.393-398
[18] Addison,J et al (2004) . Key Elasticities in Job Search Theory: International Evidence. IZA
[19] Job Search Theory (2004). http://www.ssc.upenn.edu/~rwright/courses/oss.pdf (accessed 04 02,
2011).
[20] Zaretsky, A. M. and Coughlin, C. C. (1993). An introduction to the Theory and Estimation of a Job-
Search Model.Review, 53-56.
[21] "Handout on Utility Function Transformation (2002)." Utility Transformation: Intuition..
http://www.econ.umn.edu/~golya002/downloads/3102/Sp09/3102_Handout_Utility.pdf (accessed 04
02, 2011).
[22] Rabin, M. (1999). Risk Aversion and Expected-Utility Theory: A calibration Theory. Berkeley
California:Department of Economics
[23] Chew, S. H (1980). Two representation theorems and their application to decision theory. Vancouver:
University of British Columbia.
[24] Pfitzmann, B, and Ahmad-reza, S (1996). Anonymous fingerprinting. Berlin: Springer-Verlag.
[25] Jain, A et al(1997). "On-Line Fingerprint Verification." IEEE Transactions on Pattern Analysis and
Machine Intelligence VOL. 19, No. 4, pp.302-305
[26] O'Gorman, L (1999). Fingerprint Verification. New Jersey: Verdicom Inc.
[27] Pankanti, S et al(2001). "On the Individuality of Fingerprints." IEEE Transactions on Pattern Analysis
and Machine Intelligence ,1010-1025.
[28] Ratha et al.(1996) "A Real-time Matching System for Large Fingerprint Databases." Michigan.
[29] Xiao, Q., and Raafat, H(1991). "Fingerprint image postprocessing: A combined statistical and
structural approach." Pattern Recognition, 24(10), 985-992
[30 ]Cardelli, L. (1999). Mobility and security. Microsoft Research.
[31] Speckmann, B (2008). The Android mobile platform. Michigan: Eastern Michigan University, 2008.
[32] Gordon, M and Suresh, S(2010). “Biometric Security Mechanism in Mobile Payment Systems.
Proceedins of 2010 IEEE International Conference on Wireless and Optical communication
Networks. Colombo, Srilanka
[33] Menezes, A et al (1996). Handbook of Applied Cryptography. CRC Press
[34] William, S (2005). Cryptography and Network Security Principles and Practices, Fourth Edition.
Prentice Hall
[35] Blaze, M et al(1996). Decentralized Trust Management. AT&T Research
[36] Nechvatal et al (2000). Report on the Development of the Advanced Encryption Standard (AES).
National Institute of Standards and Technology
[37] FIPA ACL Message Structure Specification (2002)." Foundation for Intelligent Physical Agents. 12
03, 2002. http://www.fipa.org (accessed 2011).
[38] Bellifemine, F et al (2007). Developing multi-agent systems with Jade. John Wiley & Sons, Ltd
20. International Journal of Computer Science, Engineering and Information Technology (IJCSEIT), Vol.2, No.1, February 2012
94
[39] Moreno et al (2003). "Using JADE-LEAP to implement agents in mobile devices."
http://jade.tilab.com/papers/Exp/02Moreno.pdf. (accessed 2011).
Authors
Salathiel Bogle receive his Master’s degree in Computer Science from University of West Indies, Jamaica
in 2011. Prior to that he did Bachelor’s Degree in Computer Science from University of Technology
Jamaica. He is presently working in reputed Telecommunication industry in Jamaica i.e. Digicel as Project
Manager. He has got a Research publication in IEEE proceedings from his Master’s Dissertation. His
research interests are mainly on intelligent agents, Mobile computing.
Dr. Suresh Sankaranarayanan holds a PhD degree (2006) in Electrical Engineering with specialization in
Networking from the University of South Australia. Later he has worked as a Postdoctoral Research Fellow
and then as a Lecturer in the University of Technology, Sydney and at the University of Sydney,
respectively during 2006-08. He is the recipient of University of South Australia President Scholarship,
towards pursuing the PhD degree programme and has also bagged the IEEE travel award in 2005. He was
working as a Lecturer (Asst. Prof. status) in the Department of Computing and lead the Intelligent
Networking Research Group, in the University of West Indies, Kingston, Jamaica, during 2008-11.
He has also worked as a Professor, School of Computer Science and Engineering, Vellore Institute of
Technology (VIT University), Chennai Campus, India, for a short period during 2011. He is now working
as Associate Professor, Department of Computer & Information Systems, Institute of Technology, Brunei
(ITB – A technological university). Currently he is also functioning as a Visiting Professor, Department of
computing, Faculty of Pure & applied Science, University of West Indies, Mona Campus, Kingston-7,
Jamaica, West Indies. He has supervised 28 research students leading to M.Sc, ME, M.Phil and M.S
degrees. He has got to his credit, as on date, about 50 fully refereed research papers published in the
Proceedings of major IEEE international conferences, as Book Chapters and in International Journals. He is
also a Reviewer and Technical Committee member for a number of IEEE Conferences and Journals. He has
conducted many tutorials, workshops and also given Guest Lectures in Networking in various Universities
and Colleges. He also managed a collaborative research programme with Oakland University, Rochester,
USA. His current research interests are mainly towards ‘Mobile and Ubiquitous Computing - Wireless
Sensor Networks, Mobile Commerce, Intelligent Agents’ used in the Health, Commercial and Engineering
sectors.