Volume-10, Issue-6, June 2024

1. The Administration Approach for the Development and Development of Tourism in Kashmir Valley

Authors: Mauzim Aziz Najar

Keywords: Tourism, Questionnaire, Tourist Sector, Socioeconomic.

Page No: 01-06

DIN IJOER-JUN-2024-1
Check the Article in Detail
Download PDF
Abstract

The golden rule of tourism's positive socioeconomic effects is that it generates income for both the host economy and the external economy. Additionally, tourism rekindles interest in the region's economy and foundation, which encourages business and, once again, results in an increase in pay for the local population. A job can be obtained specifically in the tourism industry through accommodation, dining, dancing, taxis, souvenir sales, and other tourism-related services, or more generally by contributing the goods and services needed by productions that are related to tourism. In 2014, the tourist sector contributed US$ 7.6 trillion, or 9.8%, to the global GDP, an increase of five straight years. This particular section illustrates the study's research challenges and clarifies the investigation's fundamental framework. The goals and hypotheses of the research have been thoroughly discussed. An explanation of the data collection tool and a discussion of the projection of studyrelated questions are provided. Also covered are data collection techniques and statistical analysis procedures. The main goal is to know the market development of tourism industry in Kashmir region. All of these components have been evaluated realistically in light of market development of tourism industry. The relevant features of the subject have been examined using a self-structured questionnaire.

Keywords: Tourism, Questionnaire, Tourist Sector, Socioeconomic.

References

Keywords: Tourism, Questionnaire, Tourist Sector, Socioeconomic.

2. Study on Privacy Preserving Clustering Process in Big Data

Authors: Mrs Zainab Mizwan; Dr R D Nirala

Keywords: Privacy Preserving Data Mining (PPDM), Anonymization Techniques, k-Anonymity, Generalization (in anonymization), Suppression (in anonymization), Data Loss (in anonymization), Data Utility (in anonymization), Privacy Protection, Data Security, Sensitive Data, Individual Data Privacy.

Page No: 07-13

DIN IJOER-JUN-2024-2
Check the Article in Detail
Download PDF
Abstract

In privacy preserving data mining, two principle approaches have been talked about in the writing viz. Cryptography approaches and anonymization approaches. Be that as it may, our spotlight in this thesis is on the anonymization based approaches attributable to the lesser computational cost contrasted with the cryptography approaches. As of late, different associations in various divisions viz. Medicinal, Banking and Insurance gather, store and utilize individual data of their clients. Such gathered data are additionally utilized for the investigation and research purposes. To do likewise, data mining systems have been used for playing out the errand of examination and research work. In any case, the gathered data may contain individual explicit private data. In this way, breaking down such gathered data can uncover the private data of a person. Therefore, ensuring the private data of an individual turns into a prime research issue in privacy preserving data mining

Keywords: Privacy Preserving Data Mining (PPDM), Anonymization Techniques, k-Anonymity, Generalization (in anonymization), Suppression (in anonymization), Data Loss (in anonymization), Data Utility (in anonymization), Privacy Protection, Data Security, Sensitive Data, Individual Data Privacy.

References

Keywords: Privacy Preserving Data Mining (PPDM), Anonymization Techniques, k-Anonymity, Generalization (in anonymization), Suppression (in anonymization), Data Loss (in anonymization), Data Utility (in anonymization), Privacy Protection, Data Security, Sensitive Data, Individual Data Privacy.

3. A Study of Network Intrusion Detection using Machine Learning

Authors: Ms. Reena Ostwal; Dr. Anil Pimpalapure

Keywords: Network security, Intrusion Detection System, Knowledge Discovery, Databases.

Page No: 14-22

DIN IJOER-JUN-2024-3
Check the Article in Detail
Download PDF
Abstract

Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed of the IDS is a very important issue as well learning the new attacks. This research work illustrates how the Knowledge Discovery and Data Mining (or Knowledge Discovery in Databases) KDD dataset is very handy for testing and evaluating different Machine Learning Techniques. It mainly focuses on the KDD preprocess part in order to prepare a decent and fair experimental data set. The J48, MLP, and Bayes Network classifiers have been chosen for this study. It has been proven that the J48 classifier has achieved the highest accuracy rate for detecting and classifying all KDD dataset attacks, which are of type DOS, R2L, U2R, and PROBE.

Keywords: Network security, Intrusion Detection System, Knowledge Discovery, Databases.

References

Keywords: Network security, Intrusion Detection System, Knowledge Discovery, Databases.

4. Decentralized Security Architecture Based on Software Defined Networking (SDN) in Blockchain for IOT Network

Authors: Ms. Pragati Patil; Dr. Anil Pimpalapure

Keywords: Security, Architecture, Blockchain, IoT, Network.

Page No: 23-31

DIN IJOER-JUN-2024-4
Check the Article in Detail
Download PDF
Abstract

Cloud computing has emerged as a major technology for delivering infrastructure and data service needs at cheap cost, with minimum effort and great scalability, and has therefore been widely adopted in the IT sector. Although there has been a tremendous increase in Cloud Computing use, information security issues have yet to be entirely addressed. To address the current challenges, this paper proposes a decentralised security architecture for the IoT network in the smart city based on Software Defined Networking (SDN) combined with blockchain technology that relies on the three core technologies of SDN, Blockchain, and Fog as well as mobile edge computing to detect attacks in the IoT network more effectively. Our findings show that the suggested decentralised security architecture outperforms centralised and distributed security architectures in the IoT ecosystem and takes less time to prevent threats. Our results also show that the architecture might be used with the IoT ecosystem as a security detection component that monitors and analyses the whole IoT ecosystem's traffic data to identify and prevent possible threats.

Keywords: Security, Architecture, Blockchain, IoT, Network.

References

Keywords: Security, Architecture, Blockchain, IoT, Network.

📚 Browse More Issues

Explore our complete archive of published research articles and studies.

View All Issues
📝 Submit Your Research

Contribute to our journal by submitting your original research for publication.

Submit Article