Papers by Journal of Management and Service Science (JMSS), A 2 Z Journals
Journal of Management and Service Science (JMSS), 2021
The internet always deals with data. Basically, data is any type of digital information that has ... more The internet always deals with data. Basically, data is any type of digital information that has been stored in the servers. With the advancement of technology, billions of tons of data have been accumulated over the internet. Protection of these data is very crucial as; theft of these data will lead to damages beyond imagination. Data Security is the protection of these data and privacy, which prevent hackers from unauthorized access to computers, applications, and data servers. Data security is achieved by implementing Cryptography. Cryptography is a technique in which data is encrypted and stored in the databases so that if by chance anyone gets access to these data, it will of no use to them. There are many cryptography algorithms that are widely used to encrypt and decrypt data, some of them are the AES algorithm, stream ciphers, DES algorithms, etc. The concept of cryptography is not only limited to text encryption but also has a wide application in visual cryptography, waterm...
JMSS, A2Z Journals, 2021
Goals and objectives that are well-chosen guide a fledgling firm on the correct path and keep an ... more Goals and objectives that are well-chosen guide a fledgling firm on the correct path and keep an established business up and running. Business objectives are an important element of creating priorities and positioning your firm for long-term success. Setting company goals and developing separate targets to assist you to achieve each goal will substantially improve your capacity to attain those goals. Here, we look at the concept of a business goal, the distinction between a business goal and an objective, as well as some recommendations and examples of short and long-term company goals. Goals define where you want to go and when you want to get there. They may help you enhance your company's overall performance, whether you want to gain market share or enhance customer service, for example. The more precisely you describe your objectives, the more likely you are to follow through and achieve what you set out to do in the first place. The exact measures you and your organization must take in order to accomplish each of your goals are known as objectives. They spell out exactly what you must do and when you must do it.
JMSS, A2Z Journals, 2021
Every business needs policy and management strategies for proper functioning and brilliant produc... more Every business needs policy and management strategies for proper functioning and brilliant productivity. These are the backbone of any organization which is predefining action for any task and problem. In this report, we'll discuss various aspects of a business effect by policies and management strategies. This will give an insight into policies and management strategies their creation and implementation. A company with wellplanned policies and management protocols will thrive over time without facing huge issues.
JMSS, A2Z Journals, 2021
The objective of this report is to present an overview of the project, license plate recognition.... more The objective of this report is to present an overview of the project, license plate recognition. This system is to basically detect a vehicle using the information of the license plate in order to use the information at various valid sites. This tool can work as a part of other big projects in the industry for security purposes as well as for analysis purposes. There is a detailed insight of the project in several different chapters throughout the report. This project is based on detection and recognition algorithms; using several libraries of python to work on images and videos and thereafter using the processed image to further train and test a model using machine learning algorithm such that the recognition is done with higher accuracy. The beginning outlines the introduction to the topic and its importance in the real world by highlighting some other applications using similar approach. Later it highlights the technology and skills in use in order to completely deploy the idea. Further there is an explanation to the feasibility study as well as the requirement specification while system design revolves around the basic designing of several modules which would integrate to work as the whole system and test cases. Implementation and testing approach is being discussed and thereby light has been thrown on the results and conclusion thus bringing attention to system's limitation and its future scope.
JMSS, A2Z Journals, 2021
This paper presents a methodology for social distance detection using deep learning models and al... more This paper presents a methodology for social distance detection using deep learning models and algorithms such as YOLO and CNN. Deep learning is one of those technologies which have greatly enhanced the overall experience of the technology that humans use. Deep learning has brought a lot of changes from self-driven cars made by Tesla to the smallest object detection model. Deep learning, artificial intelligence and machine learning provide a way to be able to put things to use. The purpose of this paper is to be able to implement real time object detection to detect social distancing.
JMSS, A2Z Journals, 2021
The field of Computer Vision is a branch of science of the computers and systems of software in w... more The field of Computer Vision is a branch of science of the computers and systems of software in which one can visualize and as well as comprehend the images and scenes given in the input. This field is consisting of numerous aspects for example image recognition, the detection of objects, generation of images, image super resolution and more others. Object detection is broadly utilized for the detection of faces, the detection of vehicles, counting of pedestrians on a certain street, images displayed on the web, security systems and cars with the feature of self-driving. This process also encompasses the precision of every technique for recognizing the objects. The detection of objects is a crucial task; however, it is also a very challenging vision task. It is an analytical subdivide of various applications such as searching of images, image auto-annotation or scene understanding and tracking of various objects. The tracking of objects in motion of video image sequence was one of the most important subjects in computer vision.
JMSS, A2Z Journals, 2021
Internet always deals with data. Basically, data is any type of digital information that has been... more Internet always deals with data. Basically, data is any type of digital information that has been stored in the servers. With the advancement of technology, billion tons of data have been accumulated over the internet. Protection of these data is very crucial as; theft of these data will lead to damages beyond imagination. Data Security is protection of these data and privacy, which prevent hacker from unauthorized access to computers, applications, and data servers. Data security is achieved by implementing Cryptography. Cryptography is a technique in which data is encrypted and stored in the databases, so that if by chance anyone gets access to these data, it will of no use to them. There are many cryptography algorithms that are widely used to encrypt and decrypt data, some of them are AES algorithm, stream ciphers, DES algorithms, etc. The concept of cryptography is not only limited to text encryption but also it has a wide application in visual cryptography, watermarking, steganography, etc. Now a day's security of communication has become very important, especially after people have started using internet banking. Everything on world wide web is all about confidentiality, integrity, and authentication.
JMSS, A2Z Journals, 2021
Application Development is not only limited to the business or promotional field but it
also help... more Application Development is not only limited to the business or promotional field but it
also helps to provide the necessary services to the common people across the world by creating an interaction between the companies and the customers through the website. It also creates a platform for the common people who have the ability to attract the audience using their talent. We can take the example of various blog writers, online councillors and fashion influencers who have a large audience because of their quality content and knowledge in their field. We have generally seen how the electronic companies have marked their presence on the online platform via the website which enables the users to contact the company easily. Online retail companies interact with the users via website and provide the orders at the doorsteps of the people. There are various news agencies which had created their website which keeps the users updated with the latest national and international articles. The website development has helped to create a link between the people and the companies, but behind all these facilities there is a powerful language and commands that holds these computational activities and data transfers which helps to create a good interaction between the users and the website owners. Web developers are classified into Front-end and Back-end web developers, Front-end developers help to create an interactive interface that can be easily accessed by the users, whereas Back-end development deals with the main work that is done behind the screens. We can say that it helps to power the website by managing data transfer and other computational activities. In this project, the importance of Django and back-end web development is explained. Using the tools and commands of these languages we can make an interactive and user-friendly interface that can be easily accessed by people. Back-end was earlier known for limited purposes but now when it is explored thoroughly proved to be one of the best languages for website development, gaming, Artificial Intelligence, and highly advanced mobile applications.
JMSS, A2Z Journals, 2021
In today's world, the cryptography techniques are used and implemented on the elementary method o... more In today's world, the cryptography techniques are used and implemented on the elementary method of finding the prime factor of large integer, which is said to be "Inevitable to Track". But living in an era where nothing is impossible to achieve, so cryptography techniques are exposed to both technologies' advancement in computational power of machines and advancement in the fields of mathematics to break the notion that factoring of large integers into their prime is impossible. To cope up with the threat that cryptography will face is handled by fusion of physics into cryptography, leading to the evolution of Quantum Cryptography. It is one of the fast-growing fields in computer technology. In this paper, I am going to brief the concepts of Quantum Cryptography and how this technology has led to the development of the strategy of complete secure key distribution. The paper covers the loophole present in the modern cryptography techniques, the fundamental principle of quantum cryptography, its implementation in the real world along with the limitation faced in this field, and the possible future of quantum cryptography.
JMSS, A2Z Journals, 2021
The objective of this briefing is to present an overview of the topic, machine learning technique... more The objective of this briefing is to present an overview of the topic, machine learning techniques currently in use or in consideration at statistical agencies worldwide. It is important to know the main reason why real-world scenario should start exploring the use of machine learning techniques, terminology, approach and about few popular libraries in python, what regression is, by completely throwing light on simple as well as multiple linear and non-linear regression models and their applications, classification techniques, various clustering techniques. The material presented in this paper is the result of a study based on different models and the study of various datasets (analysis and choice of the correct model are important). While Machine Learning involves concepts of automation, it requires human guidance. Machine Learning involves a high level of generalization to get a system that performs well on yet-unseen data instances. Topics like regression, classification and clustering, the report cover the insight of various techniques and their applications.
JMSS. A2Z Journals, 2021
Cyber Security refers to the processes of protecting data and systems from cyber-attacks. Any fir... more Cyber Security refers to the processes of protecting data and systems from cyber-attacks. Any firm without security policies and systematic security systems is at large risk and the important data related to that firm are not safe without security policies like. Payment Card Industry and Data Security Standard framework used to protect payment security credit card, debit card, etc. In maintaining access, the hacker inside the target system used to exploit vulnerabilities and password cracking. In today's era, day by day cybercrimes rises so it raised the requirement of system Security or even the entire network. As more business exercises are being mechanized and an expanding number of PCs are being utilized to store important data, the requirement for secure PC frameworks turns out to be more evident. As a result, network safety issues have become public safety issues.
JMSS, A2Z Journals, 2021
Android is a software stack for mobile devices that includes an operating system, middleware, and... more Android is a software stack for mobile devices that includes an operating system, middleware, and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to write managed code in a Java-like language that utilizes Google-developed Java libraries but does not support programs developed in native code. The unveiling of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made available under the Apache free-software and open-source license.
Uploads
Papers by Journal of Management and Service Science (JMSS), A 2 Z Journals
also helps to provide the necessary services to the common people across the world by creating an interaction between the companies and the customers through the website. It also creates a platform for the common people who have the ability to attract the audience using their talent. We can take the example of various blog writers, online councillors and fashion influencers who have a large audience because of their quality content and knowledge in their field. We have generally seen how the electronic companies have marked their presence on the online platform via the website which enables the users to contact the company easily. Online retail companies interact with the users via website and provide the orders at the doorsteps of the people. There are various news agencies which had created their website which keeps the users updated with the latest national and international articles. The website development has helped to create a link between the people and the companies, but behind all these facilities there is a powerful language and commands that holds these computational activities and data transfers which helps to create a good interaction between the users and the website owners. Web developers are classified into Front-end and Back-end web developers, Front-end developers help to create an interactive interface that can be easily accessed by the users, whereas Back-end development deals with the main work that is done behind the screens. We can say that it helps to power the website by managing data transfer and other computational activities. In this project, the importance of Django and back-end web development is explained. Using the tools and commands of these languages we can make an interactive and user-friendly interface that can be easily accessed by people. Back-end was earlier known for limited purposes but now when it is explored thoroughly proved to be one of the best languages for website development, gaming, Artificial Intelligence, and highly advanced mobile applications.
also helps to provide the necessary services to the common people across the world by creating an interaction between the companies and the customers through the website. It also creates a platform for the common people who have the ability to attract the audience using their talent. We can take the example of various blog writers, online councillors and fashion influencers who have a large audience because of their quality content and knowledge in their field. We have generally seen how the electronic companies have marked their presence on the online platform via the website which enables the users to contact the company easily. Online retail companies interact with the users via website and provide the orders at the doorsteps of the people. There are various news agencies which had created their website which keeps the users updated with the latest national and international articles. The website development has helped to create a link between the people and the companies, but behind all these facilities there is a powerful language and commands that holds these computational activities and data transfers which helps to create a good interaction between the users and the website owners. Web developers are classified into Front-end and Back-end web developers, Front-end developers help to create an interactive interface that can be easily accessed by the users, whereas Back-end development deals with the main work that is done behind the screens. We can say that it helps to power the website by managing data transfer and other computational activities. In this project, the importance of Django and back-end web development is explained. Using the tools and commands of these languages we can make an interactive and user-friendly interface that can be easily accessed by people. Back-end was earlier known for limited purposes but now when it is explored thoroughly proved to be one of the best languages for website development, gaming, Artificial Intelligence, and highly advanced mobile applications.