Browsing by Author "Meshram, B.B."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Analysis and design of web personalization systems for E-Commerce(International Journal of Web Technology, 2015-12) Lokhande, P. S.; Meshram, B.B.Abstract- Web personalization facilitate customizing a web site as per users preferences by using the various data mining techniques, taking advantage of the knowledge acquired from the analysis of the user’s navigational usage data. The web personalization reduces the searching time of the user and serves the purchasing interest of the user. In this paper, we have proposed the Analysis and design of the E-Commerce Systems. On the basis of the proposed Software specification Requirements ,for analysis of the systems, we proposed the class diagram for Preprocessing Systems, Knowledge Discovery Systems and Recommendation Subsystems and then provided workflow of the systems by proposing the required functional model of the systems. In the design of the systems we proposed the data structure design and Dynamic Web Systems architecture and implemented the systems. Lastly we have shown the results of the navigational behavior of the user during particular transaction.Item Digital forensics analysis for data theft(The International Journal of Forensic Computer Science, 2015-12-27) Lokhande, P. S.; Meshram, B.B.Cyber Criminals are using various techniques to attack on computing systems. Not only the professionally Cyber Criminals but also white collar IT employees are also involved in the valuable data theft. Some of the motives behind the data theft are revenge on employer, higher pay offered by a competitor company, or selling valuable data, etc. This work gives step by step approach implemented to extract the digital evidence from the computing systems of employee by whom the data theft is made. The employee used the Windows operating systems and the data in MS word format and excel format was sent to the competitor company by email and the data was also copied from the computer to the pen drive of the employee and then it was deleted from the company’s computer. The extensive literature survey is made on Digital Forensic Analysis Process, Digital Forensic Model and various tools and hardware required for forensic set up. We have simulated the investigation process to get the evidence from the suspected employee’s computer.