A Combined Location-Privacy Protective Transportable Representation
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.105-112, Nov-2015
Abstract
Location-aware smart phones support different location-based administrations (LBSs): customers question the LBS server and learn on the fly about their surroundings. However, such inquiries give away private information, enabling the LBS to distinguish and track users. We address this issue by proposing the first, to the best of our knowledge, user-communitarian insurance safeguarding approach on the other hand LBSs. Our solution, MobiCrowd, is basic to implement, it does not require evolving the LBS server architecture, and it does not expect third party privacy-insurance servers; still, MobiCrowd significantly improves customer location-privacy. The pickup stems from the joint effort of MobiCrowd-ready versatile devices: they keep their content information in a buffer, until it expires, and they pass it to other customers seeking such information. Essentially, the LBS does not need to be contacted unless all the communitarian peers in the vicinity need the looked for information. Hence, the customer can refund covered up from the server, unless it absolutely needs to expose herself through a query. Our results show that MobiCrowd hides a high part of location-based queries, along these lines significantly enhancing customer location-privacy. To study the impacts of different parameters, such as the joint effort level and contact rate between versatile users, we create a scourge model. Our simulations with genuine versatility datasets corroborate our model-based findings. Finally, our execution of MobiCrowd on Nokia platforms indicates that it is lightweight and the joint effort fetched is negligible.
Key-Words / Index Term
Data Privacy, Location Privacy, Mobicrowd, Wireless Communication
References
[1] Tianqing Zhu ; Sch. of Inf. Technol., Deakin Univ., Melbourne, VIC, Australia ; Ping Xiong ; Gang Li ; Wanlei Zhou, “Correlated Differential Privacy: Hiding Information in Non-IID Data Set”, Published in: Information Forensics and Security, IEEE Transactions on (Volume:10 , Issue: 2 ) Page(s): 229 – 242 Date of Publication : 06 November 2014.
[2] Zhang Kun ; Shandong Provincial Key Lab. of Network Based Intell. Comput., Univ. of Jinan, Jinan, China ; Abraham, A. ; Shi Yuliang, “Data Combination Privacy Preservation Adjusting Mechanism for Software as a Service”, Published in: Systems, Man, and Cybernetics (SMC), 2013 IEEE International Conference on Date of Conference: 13-16 Oct. 2013 Page(s): 2007 – 2012.
[3] Pan Yang ; Sch. of Electron. & Inf. Eng., Xi'an Jiaotong Univ., Xi'an, China ; Xiaolin Gui ; Feng Tian ; Jing Yao, “A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining”, Published in: High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing (HPCC_EUC), 2013 IEEE 10th International Conference on Date of Conference: 13-15 Nov. 2013.
[4] Shokri, R. ; LCA, EPFL, Lausanne, Switzerland ; Papadimitratos, P. ; Theodorakopoulos, G. ; Hubaux, J.-P., “Collaborative Location Privacy”, Published in: Mobile Adhoc and Sensor Systems (MASS), 2011 IEEE 8th International Conference on Date of Conference: 17-22 Oct. 2011 Page(s): 500 – 509.
[5] Zeyu Zheng ; Dept. of Comput. Sci., City Univ. of Hong Kong, Hong Kong, China ; Jianping Wang ; Jin Wang, “A Study of Network Throughput Gain in Optical-Wireless (FiWi) Networks Subject to Peer-to-Peer Communications”, Published in: Communications, 2009. ICC '09. IEEE International Conference on Date of Conference: 14-18 June 2009 Page(s): 1 – 6.
[6] Deicke, F. ; Fraunhofer IPMS, Dresden, Germany ; Fisher, W. ; Faulwasser, M., “Optical wireless communication to eco-system”, Published in: Future Network & Mobile Summit (FutureNetw), 2012 Date of Conference: 4-6 July 2012 Page(s): 1 – 8.
[7] Ying, Yun ; University of Shanghai for Science and Technology, Shanghai 200093 China ; Shuguang, Dai ; Ping'an, Mu ; Tianfa, Su, “A Duplex Wireless Audio Communication System”, Published in: Electronic Measurement and Instruments, 2007. ICEMI '07. 8th International Conference on Date of Conference: Aug. 16 2007-July 18 2007 Page(s): 2-150 - 2-153.
[8] Hagem, R.M. ; Centre for Wireless Monitoring & Applic., Griffith Univ., Brisbane, QLD, Australia ; Thiel, D.V. ; O'Keefe, S.G. ; Fickenscher, T., “Optical wireless communication for real time swimmers feedback: A review”, Published in: Communications and Information Technologies (ISCIT), 2012 International Symposium on Date of Conference: 2-5 Oct. 2012 Page(s): 1080 – 1085.
[9] Jose, J. ; Dept. Inf. Technol., Karunya Univ., Coimbatore, India ; Princy, M. ; Jose, J., “PEPPDA: Power efficient privacy preserving data aggregation for wireless sensor networks”, Published in: Emerging Trends in Computing, Communication and Nanotechnology (ICE-CCN), 2013 International Conference on Date of Conference: 25-26 March 2013 Page(s): 330 – 336.
[10] Perera, C. ; Open Univ., Milton Keynes, UK ; Ranjan, R. ; Lizhe Wang, “End-to-End Privacy for Open Big Data Markets”, Published in: Cloud Computing, IEEE (Volume:2 , Issue: 4 ) Page(s): 44 – 53.
[11] Jian Wang ; Coll. of Inf. Sci. & Technol., Donghua Univ., Shanghai, China ; Yongcheng Luo ; Yan Zhao ; Jiajin Le, “A Survey on Privacy Preserving Data Mining”, Published in: Database Technology and Applications, 2009 First International Workshop on Date of Conference: 25-26 April 2009 Page(s): 111 – 114.
Citation
C.Thangamalar and C. Pradhap , "A Combined Location-Privacy Protective Transportable Representation," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.105-112, 2015.
Context-Aware Quantity Established Entrance Device Developing Operator Connection
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.113-118, Nov-2015
Abstract
Part based access control is widely utilized in modern venture structures because it is adequate on the other hand reflecting the functional progressive system in different organizations’ on the other hand access control model. However, ecological changes, such as the expanding use of versatile devices, make a few challenges. Our relook suggests a relationship-based access control model that considers the connection with encompassing customers in organization. Connection is huge connection data in any case it is not considered in existing access control models. The proposed system is specific from that in conventional relook in two ways. First, we regard the relationship among employees as pertinent information. As a result, the administration the other hand can oversee fine-grained access control on the other hand helpful work in an organization. Second, we plan access control construction modeling utilizing NFC system to bargain with capacity also, security problems. Moreover, we propose a convention on the other hand enforcing the recommended access control model in genuine world. We report execution examination also, security evaluation
Key-Words / Index Term
Access Control, Context-Aware, Relationship-Based, Security
References
[1] Bai Qing-hai ; Coll. of Comput. Sci. & Technol., Jilin Univ., Changchun, China ; Zheng Ying, “Study on the access control model”, Published in: Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), 2011 (Volume:1 ) Date of Conference: 26-30 July 2011 Page(s): 830 – 834.
[2] Rashid, Z. ; Sch. of Electr. Eng. & Comput. Sci. (SEECS), Nat. Univ. of Sci. & Technol., Islamabad, Pakistan ; Basit, A. ; Anwar, Z., “TRDBAC: Temporal reflective database access control”, Published in: Emerging Technologies (ICET), 2010 6th International Conference on Date of Conference: 18-19 Oct. 2010 Page(s): 337 – 342.
[3] Yanfang Fan ; Sch. of Comput. & Inf. Technol., Beijing Jiaotong Univ., Beijing, China ; Zhen Han ; Jiqiang Liu ; Yong Zhao, “A Mandatory Access Control Model with Enhanced Flexibility”, Published in: Multimedia Information Networking and Security, 2009. MINES '09. International Conference on (Volume:1 ) Date of Conference: 18-20 Nov. 2009 Page(s):120 – 124.
[4] Cai Tao ; Comput. Dept., JiangSu Univ., Zhenjiang, China ; Ju Shiguang ; Niu DeJiao, “Two-Layered Access Control for Storage Area Network”, Published in: Grid and Cooperative Computing, 2009. GCC '09. Eighth International Conference on Date of Conference: 27-29 Aug. 2009 Page(s): 331 – 336.
[5] Lowe, R. ; CC Inf. Syst. & Manage., Munich Univ. of Appl. Sci., Munich, Germany ; Mandl, P. ; Weber, M., “Context Directory: A context-aware service for mobile context-aware computing applications by the example of Google Android”, Published in: Pervasive Computing and Communications Workshops (PERCOM Workshops), 2012 IEEE International Conference on Date of Conference: 19-23 March 2012 Page(s): 76 – 81.
[6] Hengshu Zhu ; Univ. of Sci. & Technol. of China, Hefei, China ; Enhong Chen ; Kuifei Yu ; Huanhuan Cao, “Mining Personal Context-Aware Preferences for Mobile Users”, Published in: Data Mining (ICDM), 2012 IEEE 12th International Conference on Date of Conference: 10-13 Dec. 2012 Page(s): 1212 – 1217.
[7] Jiafu Wan ; Sch. of Mech. & Automotive Eng., South China Univ. of Technol. (SCUT), Guangzhou, China ; Daqiang Zhang ; Shengjie Zhao ; Yang, L., “Context-aware vehicular cyber-physical systems with cloud support: architecture, challenges, and solutions, Published in: Communications Magazine, IEEE (Volume:52 , Issue: 8 ) Page(s): 106 – 113.
[8] Sheikh, K. ; Center for Telematics & Inf. Technol., Twente Univ., Enschede ; Wegdam, M. ; van Sinderen, M., “Middleware Support for Quality of Context in Pervasive Context-Aware Systems”, Published in: Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on Date of Conference: 19-23 March 2007 Page(s): 461 – 466.
[9] Po-Cheng Huang ; Comput. Sci. & Inf. Eng., Nat. Cheng Kung Univ., Tainan ; Yau-Hwang Kuo, “A reliable Context Model for context-aware applications”, Published in: Systems, Man and Cybernetics, 2008. SMC 2008. IEEE International Conference on Date of Conference: 12-15 Oct. 2008 Page(s): 246 – 250.
[10] Wangcheng Long ; State Power Econ. Res. Inst., Beijing, China ; Feng Han ; Hui Li ; Jinyu Xiao, “The force-dynamic relation study between security and efficiency of power grid based on the evaluation model”, Published in: Power System Technology (POWERCON), 2014 International Conference on Date of Conference: 20-22 Oct. 2014 Page(s): 251 – 256.
[11] Xi-quan Guo ; Sch. of Mangagement, Jinan Univ., Guangzhou, China ; Wei-qi Luo ; Guo-xiang Yao, “Comprehensive Evaluation Based on Gray Relation Analysis for Information Security Management Measurement, Published in: Information Science and Management Engineering (ISME), 2010 International Conference of (Volume:1 ) Date of Conference: 7-8 Aug. 2010 Page(s): 143 – 146.
[12] Yau, S.S. ; Dept. of Comput. Sci. & Eng., Arizona State Univ., Tempe, AZ, USA ; Xinyu Zhang, “Computer network intrusion detection, assessment and prevention based on security dependency relation”, Published in: Computer Software and Applications Conference, 1999. COMPSAC '99. Proceedings. The Twenty-Third Annual International Date of Conference: 1999 Page(s): 86 – 91.
Citation
C. Thangamalar, P. Sathiyapriya, "Context-Aware Quantity Established Entrance Device Developing Operator Connection," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.113-118, 2015.
Study on Differential Query Services Using Data Mining Techniques in Cloud Computing
Review Paper | Journal Paper
Vol.3 , Issue.11 , pp.119-123, Nov-2015
Abstract
Cloud processing as a developing innovation trend is estimated to reshape the advances in Information technology. In a cost-efficient cloud infrastructure, a client can tolerate a certain degree of interval while retrieving Information from the cloud to diminish costs. In this paper, we address two major issues in such an environment: secrecy and efficiency. We first review a hidden keyword based document recovery plan that was formerly proposed by Ostrovsky. Their structure licenses a client to get records of interest from a not trusted server without disclosing any info. The primary disadvantage is that it will cause a huge questioning above acquired on the cloud, and thus goes opposite the novel intention of cost efficiency. In this paper, we present a scheme, termed viable Information retrieval for positioned query, and based on a conglomeration and appropriation layer, to diminish questioning above acquired on the cloud. In viable Information retrieval for positioned query, inquiries are classified into numerous ranks, where a higher positioned query can get a higher proportion of coordinated files. A client can get records on demand by selecting inquiries of dissimilar ranks. Huge number of coordinated records is useful in this feature, but the client just wants a little subset of them. Under dissimilar parameter settings, broad estimations have been conducted together analytical models and on a genuine cloud infrastructure, in request to examine the usefulness of our schemes.
Key-Words / Index Term
Cloud Computing, Single Cloud, Multi-Cloud, Cloud Storage
References
[1] Shaikh, F.B. ; Dept. of Comput. & Technol., SZABIST, Islamabad, Pakistan ; Haider, S., “Security threats in cloud computing”, Published in: Internet Technology and Secured Transactions (ICITST), 2011 International Conference for Date of Conference: 11-14 Dec. 2011 Page(s): 214 – 219.
[2] Almorsy, M. ; Comput. Sci. & Software Eng., Swinburne Univ. of Technol., Hawthorn, VIC, Australia ; Grundy, John ; Ibrahim, A.S., “Collaboration-Based Cloud Computing Security Management Framework”, Published in: Cloud Computing (CLOUD), 2011 IEEE International Conference on Date of Conference: 4-9 July 2011 Page(s): 364 – 371.
[3] Zehua Zhang ; Sch. of Inf. Sci. & Eng., Yunnan Univ., Kunming, China ; Xuejie Zhang, “Realization of open cloud computing federation based on mobile agent”, Published in: Intelligent Computing and Intelligent Systems, 2009. ICIS 2009. IEEE International Conference on (Volume:3 ) Date of Conference: 20-22 Nov. 2009 Page(s): 642 – 646.
[4] Wang En Dong ; State Key Lab. of High-end Server & Storage Technol., Beijing, China ; Wu Nan ; Li Xu, “QoS-Oriented Monitoring Model of Cloud Computing Resources Availability”, Published in: Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on Date of Conference: 21-23 June 2013 Page(s): 1537 – 1540.
[5] Amanatullah, Y. ; Hochschule Fulda, Angewandte Inf., Fulda, Germany ; Lim, C. ; Ipung, H.P. ; Juliandri, A., “Toward cloud computing reference architecture: Cloud service management perspective”, Published in: ICT for Smart Society (ICISS), 2013 International Conference on Date of Conference: 13-14 June 2013 Page(s): 1 – 4.
[6] Revar, A.G. ; Bhavsar, M.D.” Securing user authentication using single sign-on in Cloud Computing”, Published in: Engineering (NUiCONE), 2011 Nirma University International Conference on Date of Conference: 8-10 Dec. 2011 Page(s): 1 – 4.
[7] Boyang Li ; Dept. of Electr. & Comput. Eng., Clarkson Univ., Potsdam, NY, USA ; Chen Liu,” Parallel BP Neural Network on Single-chip Cloud Computer”, Published in: High Performance Computing and Communications (HPCC), 2015 IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), 2015 IEEE 12th International Conferen on Embedded Software and Systems (ICESS), 2015 IEEE 17th International Conference on Date of Conference: 24-26 Aug. 2015 Page(s): 1871 – 1875.
[8] AlZain, M.A. ; Dept. of Comput. Sci. & Comput. Eng., La Trobe Univ., Melbourne, VIC, Australia ; Pardede, E. ; Soh, B. ; Thom, J.A.” Cloud Computing Security: From Single to Multi-clouds”, Published in: System Science (HICSS), 2012 45th Hawaii International Conference on Date of Conference: 4-7 Jan. 2012 Page(s): 5490 – 5499.
[9] Magedanz, T. ; Tech. Univ., Berlin, Germany ; Schreiner, F.” QoS-aware multi-cloud brokering for NGN services: Tangible benefits of elastic resource allocation mechanisms”, Published in: Communications and Electronics (ICCE), 2014 IEEE Fifth International Conference on Date of Conference: July 30 2014-Aug. 1 2014 Page(s):168 – 173.
[10] Lee, Dah-Sheng ; Network Operations Laboratory, Chunghwa Telecom Laboratories, Taipei city, Taiwan, R.O.C. ; Wei-Te Sung ; Shuang-Mei Wang ; Jin-Yuan Shun,” Multi-cloud service fulfillment architecture for enabling digital rain forest”, Published in: Network Operations and Management Symposium (APNOMS), 2013 15th Asia-Pacific Date of Conference: 25-27 Sept. 2013 Page(s):1 – 3.
[11] Suganthi, J. ; Dept. of Comput. Sci. & Eng, Hindusthan Coll. of Eng. & Technol., Coimbatore, India ; Ananthi, J. ; Archana, S.” Privacy preservation and public auditing for cloud data using ASS in Multi-cloud”, Published in: Innovations in Information, Embedded and Communication Systems (ICIIECS), 2015 International Conference on Date of Conference: 19-20 March 2015 Page(s):1 – 6.
[12] Slamanig, D. ; Inst. for Appl. Inf. Process. & Commun. (IAIK), Graz Univ. of Technol. (TUG), Graz, Austria ; Hanser, C.” On cloud storage and the cloud of clouds approach”, Published in: Internet Technology And Secured Transactions, 2012 International Conference for Date of Conference: 10-12 Dec. 2012 Page(s): 649 – 655.
[13] Ning Li ; Nat. Eng. Res. Center for Supporting Software of Enterprise Internet Services, Kingdee Software (China) Co. Ltd., Shenzhen, China ; Liang-Jie Zhang ; Ping Xu ; Li Wang,” Research on Pricing Model of Cloud Storage”, Published in: Services (SERVICES), 2013 IEEE Ninth World Congress on Date of Conference: June 28 2013-July 3 2013 Page(s): 412 – 419.
[14] Yen-Hung Kuo ; Cloud Syst. Software Inst., Inst. for Inf. Ind., Taipei, Taiwan ; Yu-Lin Jeng ; Juei-Nan Chen” A Hybrid Cloud Storage Architecture for Service Operational High Availability”, Published in: Computer Software and Applications Conference Workshops (COMPSACW), 2013 IEEE 37th Annual Date of Conference: 22-26 July 2013 Page(s): 487 – 492.
[15] Prabavathy, B. ; Dept. of Comput. Sci., SSN Coll. of Eng., Kalavakkam, India ; Priya, K. ; Babu, C.” A load balancing algorithm for private cloud storage”, Published in: Computing, Communications and Networking Technologies (ICCCNT),2013 Fourth International Conference on Date of Conference: 4-6 July 2013 Page(s): 1 – 6.
Citation
S.Kamalavardhini, S.Baladeepika , "Study on Differential Query Services Using Data Mining Techniques in Cloud Computing," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.119-123, 2015.
An Innovative Statement Method Aimed At DTN Over Manet Planning
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.124-128, Nov-2015
Abstract
Vindictive and childish practices represent a genuine danger against directing in Delay/Disruption Tolerant frameworks (DTNs). Due to the unique system characteristics, designing a misbehavior identification plan in DTN is regarded as a great challenge. iTrust, a probabilistic misbehavior identification scheme, for secure DTN directing towards viable trust establishment. The basic idea of iTrust is introducing a intermittently accessible Trusted Power (TA) to judge the node’s conduct based on the gathered directing confirmations and probabilistically checking. iTrust model as the Review Amusement and use Amusement hypothetical examination to illustrate that, by setting an fitting examination probability, TA could guarantee the security of DTN directing at a lessened cost. To further progress the proficiency of the proposed scheme, to relate identification likelihood with a node’s reputation, which licenses a dynamic identification likelihood determined by the trust of the users. The broad examination and recreation results appear that the proposed scheme substantiates the viability and proficiency of the proposed scheme.
Key-Words / Index Term
Burglary; Intrusion Detection; Fisheye Lens; Motion Identification
References
[1] Maiti, A.; Sch. of Comput. Sci. & Eng., VIT Univ., Vellore, India; Sivanesan, S. “Cloud controlled intrusion detection and burglary prevention stratagems in home automation systems” Published in: Future Internet Communications (BCFIC), 2012 2nd Baltic Congress on Date of Conference: 25-27 April 2012 Page(s) 182 – 186.
[2] Kebkal, O.; EvoLogics GmbH, Berlin, Germany; Kebkal, V.; Kebkal, K. “EviNS: A framework for development of underwater acoustic sensor networks and positioning systems” Published in: OCEANS 2015 - Genova Date of Conference: 18-21 May 2015 Page(s): 1 – 6.
[3] Zheng, Y.R.; Dept. of Electr. & Comput. Eng., Missouri Univ. of Sci. & Technol., Rolla, MO, USA ; Zengli Yang ; Ming Yue ; Bing Han more authors “DSP implementation of direct-sequence spread spectrum underwater acoustic modems with networking capability” Published in: Oceans - St. John's, 2014 Date of Conference: 14-19 Sept. 2014 Page(s): 1 – 5.
[4] Chandrasekhar, V.; Inst. for Infocomm Res., Singapore; Seah, W. “An Area Localization Scheme for Underwater Sensor Networks” Published in: OCEANS 2006 - Asia Pacific Date of Conference: 16-19 May 2007 Page(s): 1 – 8.
[5] Vermeij, A. ; NATO STO Centre for Maritime Res. & Experimentation (CMRE), La Spezia, Italy ; Munafo, A. “Real-time clock synchronisation in underwater acoustic networks” Published in: OCEANS 2015 - Genova Date of Conference: 18-21 May 2015 Page(s): 1 – 6.
[6] Caner, G.; Electr. & Comput. Eng. Dept., Rochester Univ., NY; Tekalp, A.M.; Sharma, G.; Heinzelman, W. “Local Image Registration by Adaptive Filtering” Published in: Image Processing, IEEE Transactions on (Volume:15 , Issue: 10 ) Date of Publication : Oct. 2006 Page(s): 3053 – 3065.
[7] Bashir, F.; Retica Syst., Inc., Waltham, MA, USA; Usher, D.; Casaverde, P.; Friedman, M. “Video Surveillance for Biometrics: Long-Range Multi-biometric System Full Text” Published in: Advanced Video and Signal Based Surveillance, 2008. AVSS '08. IEEE Fifth International Conference on Date of Conference: 1-3 Sept. 2008 Page(s): 175 – 182.
[8] Knorr, M.; Comput. Vision Res. Lab., Robert Bosch GmbH, Hildesheim, Germany; Niehsen, W.; Stiller, C. “Robust ground plane induced homography estimation for wide angle fisheye cameras” Published in: Intelligent Vehicles Symposium Proceedings, 2014 IEEE Date of Conference: 8-11 June 2014 Page(s): 1288 – 1293.
Citation
T.Venkatesan and S.Sharmila, "An Innovative Statement Method Aimed At DTN Over Manet Planning," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.124-128, 2015.
Precedence Metric Constructed Ad Hoc Direction-Finding For Submerged Radar Networks
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.129-138, Nov-2015
Abstract
This paper investigates applications and challenges at that point a pick up submerged sensor at that point a pick up networks. We highlight potential applications to off-shore oilfields at that point a pick up seismic monitoring, hardware monitoring, and submerged robotics. We identify relook headings in short- range acoustic communications, MAC, time synchronization, and limitation conventions at that point pick up high-idleness acoustic networks, long- length of time framework sleeping, and application-level data scheduling. We depict our preparatory arrangement on short-run acoustic correspondence hardware, and summarize results of high-idleness time synchronization.
Key-Words / Index Term
Underwater Sensor Network, Physical Layer, Synchronization
References
[1] Yu Yang ; Coll. Of Marine, Northwestern Polytech. Univ., Xi''an ; Zhang Xiaomin ; Peng Bo ; Fu Yujing, “Design of sensor nodes in underwater sensor networks”, Published in: Industrial Electronics and Applications, 2009. ICIEA 2009. 4th IEEE Conference on Date of Conference: 25-27 May 2009 Page(s): 3978 – 3982
[2] Dharan, K.T. ; SITE, VIT Univ., Vellore, India ; Srimathi, C. ; Soo-Hyun Park, “A sweeper scheme for localization and mobility prediction in underwater acoustic sensor networks”, Published in: OCEANS 2010 IEEE – Sydney Date of Conference: 24-27 May 2010 Page(s): 1 – 7.
[3] Donghoon Kim ; Dept. of Comput. Sci., Florida State Univ., Tallahassee, FL ; Yong-Man Cho ; Changhwa Kim ; Sangkyung Kim, “E-ITRC Protocol with Long & Adjustable Range on Underwater Acoustic Sensor Network”, Published in: Advanced Information Networking and Applications Workshops, 2007, AINAW '07. 21st International Conference on (Volume:2 ) Date of Conference: 21-23 May 2007 Page(s): 665 – 672.
[4] Peng Jiang ; Syst. Eng. Res. Inst., CSSC, Beijing, China, “An underwater sensor network localization algorithm based on Time-of-Arrivals (TOAs)”, Published in: Natural Computation (ICNC), 2013 Ninth International Conference on Date of Conference: 23-25 July 2013 Page(s): 1552 – 1556.
[5] Yujun Li ; Sch. of Comput. Sci. & Eng., Univ. of Electron. Sci. & Technol. of China, Chengdu, China ; Yaling Yang, “Notice of Retraction Deliverability of greedy routing in underwater sensor networks”, Published in: Computer Engineering and Technology (ICCET), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 16-18 April 2010 Page(s): V2-130 - V2-134.
[6] Chavhan, J.W. ; Dept. of Electron. Eng., K.D.K. Coll. of Eng., Nagpur, India ; Sarate, G.G., “Smart Antenna approach in underwater Acoustic Sensor Network using OFDM: A review”, Published in: Green Computing, Communication and Conservation of Energy (ICGCE), 2013 International Conference on Date of Conference: 12-14 Dec. 2013 Page(s): 155 – 158.
[7] Yildirim, K.S. ; Dept. of Comput. Eng., Ege Univ., Izmir, Turkey ; Kantarci, A., “External Gradient Time Synchronization in Wireless Sensor Networks”, Published in: Parallel and Distributed Systems, IEEE Transactions on (Volume:25 , Issue: 3 ) Page(s): 633 – 641 ISSN : 1045-9219.
[8] Hyungu Hwang ; Mobile Telecommun. Res. Div., Electron. & Telecommun. Res. Inst., Daejeon, South Korea ; Daeho Kim, “Practical Time Synchronization for OFDM Systems on Mobile Channel”, Published in: Computer Communications and Networks (ICCCN), 2012 21st International Conference on Date of Conference: July 30 2012-Aug. 2 2012 Page(s): 1 – 5.
[9] Jie Wu ; Sch. of Electron. Inf. Eng., Tianjin Univ., Tianjin, China ; Liyi Zhang ; Yu Bai ; Yunshan Sun, “Cluster-Based Consensus Time Synchronization for Wireless Sensor Networks”, Published in: Sensors Journal, IEEE (Volume:15 , Issue: 3 ) Page(s): 1404 – 1413.
Citation
T.Venkatesan and R. Sunitha, "Precedence Metric Constructed Ad Hoc Direction-Finding For Submerged Radar Networks," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.129-138, 2015.
Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.139-145, Nov-2015
Abstract
The venture defines and understand the issue of multi-catchphrase positioned seek over scrambled cloud Information (MRSE) while saving strict framework insightful assurance in the cloud processing paradigm. Information proprietors are motivated to outsource their complex Information administration frameworks from neighborhood sites to the business open cloud for awesome adaptability and monetary savings. But for ensuring Information privacy, delicate Information have to be scrambled before outsourcing, which obsoletes customary Information usage based on plain content catchphrase search. Thus, enabling a scrambled cloud Information seek administration is importance. Considering the vast number of Information clients and archives in the cloud, it is vital to allow numerous catchphrases in the seek demand and return archives in the request of their significance to these keywords. Related works on searchable encryption center on single catchphrase seek or Boolean catchphrase search, and rarely sort the seek results. Among diverse multi-catchphrase semantics, choosing the proficient likeness measure of “coordinate matching,” i.e., as numerous matches as possible, to catch the significance of Information archives to the seek query. Specifically, here use the “internal item similarity” i.e., the number of inquiry catchphrases appearing in a document, to quantitatively assess such likeness measure of that archive to the seek query. Amid the file construction, each archive is related with a twofold vector as a sub file where each bit represents whether relating catchphrase is contained in the document. The seek inquiry is too depicted as a twofold vector where each bit implies whether relating catchphrase appears in this seek request, so the likeness could be precisely measured by the internal item of the inquiry vector with the Information vector. However, straightforwardly outsourcing the Information vector or the inquiry vector will damage the file assurance or the seek privacy. The vector space model helps to give sufficient seek accuracy, and the DES encryption empowers clients to include in the positioning while the majority of processing work is done on the server side by operations just on figure text. As a result, Information spillage can be eliminated and Information security is ensured. Intensive security and execution investigation appear that the proposed scheme ensures high security and practical efficiency.
Key-Words / Index Term
MRSE, OTP, Cloud, Item similarity
References
[1] Karapakula, A.; Puramchand, M.; Rafi, G.M."Coordinate matching for effective capturing the similarity between query keywords and outsourced documents", Published in: Sustainable Energy and Intelligent Systems (SEISCON 2012), IET Chennai 3rd International on, Date of Conference:27-29 Dec. 2012Page(s):1- 7.
[2] Laveti, G.; Dept. of E.C.E, Sangivalasa, Visakhapatnam, India; Sasibhushana Rao, G.; Kumar, M.N.V.S.S.; Goswami, R. ,” A Novel TOA measurement based global evolutionary search estimator for defence applications”, Published in: Electrical, Electronics, Signals, Communication and Optimization (EESCO), 2015 International Conference on, Date of Conference:24-25 Jan. 2015, Page(s):1 – 4
[3] Zhiyong Xu; Shenzhen Inst. of Adv. Technol., Shenzhen, China; Wansheng Kang; Ruixuan Li; Kinchoong Yow ,“ Efficient Multi-Keyword Ranked Query on Encrypted Data in the Cloud”, Published in:Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on, Date of Conference:17-19 Dec. 2012,Page(s):244 – 251.
[4] Mantel, C.; Dept. of Photonics Eng., Tech. Univ. of Denmark, Lyngby, Denmark; Ferchiu, S.C.; Forchhammer, S.,” Comparing subjective and objective quality assessment of HDR images compressed with JPEG-XT“,Published in: Multimedia Signal Processing (MMSP), 2014 IEEE 16th International Workshop on, Date of Conference:22-24 Sept. 2014, Page(s):1 – 6
[5] Woan Yun Hsiao; Inst. of Electron. Eng., Nat. Tsing-Hua Univ., Hsinchu, Taiwan; Chin Yu Mei; Wen Chao Shen; Tzong Sheng Chang ,” A high density Twin-Gate OTP cell in pure 28nm CMOS process “,Published in: VLSI Technology, Systems and Application (VLSI-TSA), Proceedings of Technical Program - 2014 International Symposium on ,Date of Conference:28-30 April 2014 Page(s):1 – 2.
[6] Chang-Lung Tsai; Dept. of Comput. Sci. & Inf. Eng., Chinese Culture Univ., Taipei, Taiwan; Chun-Jung Chen; Deng-Jie Zhuang,” Secure OTP and Biometric Verification Scheme for Mobile Banking“,Published in:Mobile, Ubiquitous, and Intelligent Computing (MUSIC), 2012 Third FTRA International Conference on ,Date of Conference:26-28 June 2012 ,Page(s):138 - 141
[7] Chao-Hsi Huang; Inst. of Comput. Sci. & Inf. Eng., Nat. Ilan Univ., Ilan, Taiwan; Shih-Chih Huang,” RFID systems integrated OTP security authentication design“,Published in:Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2013 Asia-Pacific, Date of Conference:Oct. 29 2013-Nov. 1 2013, Page(s):1 – 8.
[8] Wenge, O.; Multimedia Commun. Lab. (KOM) Tech., Univ. Darmstadt, Darmstadt, Germany; Schuller, D.; Steinmetz, R.,” Towards Establishing Security-Aware Cloud Markets”, Published in:Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, Date of Conference:15-18 Dec. 2014, Page(s):1027 – 1032
[9] Nagalakshmi, N.; Rajalakshmi, S.,” Enabled security based on elliptic curve cryptography with optimal resource allocation schema in cloud computing environment”, Published in:Computing, Communication and Information Systems (NCCCIS), 2015 IEEE Seventh National Conference on, Date of Conference:13-14 Feb. 2015,Page(s):17 – 22.
[10] Khanna, P.; Inst. of Eng. & Technol., JK Lakshmipat Univ., Jaipur, India; Jain, S.; Babu, B.V.,” Cloud Broker: Working in federated structures“,Published in:Advances in Computing, Communications and Informatics (ICACCI, 2014 International Conference on, Date of Conference:24-27 Sept. 2014,Page(s):1273 – 1278.
[11] Yefei Zha; Sch. of Comput. Sci. & Eng., Southeast Univ., Nanjing, China; Yuqing Zhai,” An Improved Collaborative Filtering Model Considering Item Similarity“,Published in:Information Science and Cloud Computing Companion (ISCC-C), 2013 International Conference on, Date of Conference:7-8 Dec. 2013,Page(s):428 – 434.
[12] Wang Weijie; Dept. of Comput. Sci. & Technol., East China Normal Univ., Shanghai, China; Yang Jing; He Liang,” An Improved Collaborative Filtering Based on Item Similarity Modified and Common Ratings”, Published in: Cyberworlds (CW), 2012 International Conference on, Date of Conference:25-27 Sept. 2012,Page(s):231 – 235.
[13] Bai Juan; Dept. of Inf. Eng., North China Univ. of Water Conservancy & Electron. Power, Zhengzhou, China,” Collaborative filtering recommendation algorithm based on semantic similarity of item”, Published in:Advanced Computational Intelligence (ICACI), 2012 IEEE Fifth International Conference on, Date of Conference:18-20 Oct. 2012, Page(s):452 – 454.
[14] Feng Xie; Dept. of Autom., Tsinghua Univ., Beijing, China; Zhen Chen; Jiaxing Shang; Wenliang Huang ,” Item Similarity Learning Methods for Collaborative Filtering Recommender Systems”, Published in:Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on, Date of Conference:24-27 March 2015, Page(s):896 – 903.
Citation
S.M.Manimalathi and A.Senthilkumar, "Enhancing Security and Efficiency In Cloud Computing Users Using Multi-keyword Ranking Model," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.139-145, 2015.
Attack Identification Based On Routing And Nonce Approach
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.146-151, Nov-2015
Abstract
Pernicious and selfish practices represent a genuine risk against steering in delay/disturbance tolerant frameworks (DTNs). Due to the exceptional framework characteristics, designing a misconduct location plan in DTN is regarded as a great challenge. In this paper, we propose iTrust, a probabilistic misconduct location scheme, for secure DTN steering toward effective trust establishment. The Fundamental idea of iTrust is introducing a periodically available Trusted Power (TA) to judge the node’s behavior based on the collected steering evidences and probabilistically checking. We model iTrust as the inspection diversion and use diversion theoretical investigation to illustrate that, by setting an appropriate investigation probability, TA could ensure the security of DTN steering at a decreased cost. To further improve the productivity of the proposed scheme, we correlate location likelihood with a node’s reputation, which allows a dynamic location likelihood decided by the trust of the users. The extensive investigation and reproduction results illustrate the effectiveness and productivity of the proposed scheme. . Indeed though the existing misconduct location plans work well for the customary remote networks, the exceptional framework qualities counting need of contemporaneous path, high variety in framework conditions, trouble to anticipate portability patterns, and long input delay have made the neighborhood observing based misconduct location plan unsatisfactory for DTNs. Selfish hub B gets the parcels from hub A but dispatches the bneed gap assault by refutilizing to forward the parcels to the next jump recipient C. Since there may be no neighboring hubs at the minute that B meets C, the misconduct (e.g., dropping messages) can’t be distinguished due to need of witness, which renders the monitoring-based misconduct location less.
Key-Words / Index Term
Framework Security, Delay Tolerant Networks, Protocols
References
[1] Mishra, A. ; Comput. Sci. & Eng., GGITM, Bhopal, India ; Jhapate, A.K. ; Kumar, P.” Improved Genetic Feedback Algorithm Based Network Security Policy Frame Work”, Published in: Future Networks, 2010. ICFN '10. Second International Conference on Date of Conference: 22-24 Jan. 2010 Page(s):8 – 10.
[2] Ganesh, S. ; Dept. of ECE, Sathyabama Univ., Chennai, India ; Sankar, S. ; Saravanakumar, S. ; Rex, S.L. ,” Three tier security frame work for Wireless Sensor Networks”, Published in: Advanced Nanomaterials and Emerging Engineering Technologies (ICANMEET), 2013 International Conference on Date of Conference: 24-26 July 2013 Page(s): 582 – 586.
[3] Volner, R. ; Dept. of Air Transp., Czech Tech. Univ., Prague, Czech Republic ; Lubomir, P.” Wireless biomedical home security network - architecture and modelling”, Published in: Security Technology, 2004. 38th Annual 2004 International Carnahan Conference on Date of Conference: 11-14 Oct. 2004 Page(s):69 – 76.
[4] Martin, C. ; Univ. of Ontario Inst. of Technol., Oshawa ; Refai, M.” A Policy-Based Metrics Framework for Information Security Performance Measurement”, Published in:Business-Driven IT Management, 2007. BDIM '07. 2nd IEEE/IFIP International Workshop on Date of Conference: 21-21 May 2007 Page(s): 94 – 101.
[5] Feltus, C. ; Public Res. Centre Henri Tudor, Luxembourg-Kirchberg, Luxembourg ; Ouedraogo, M. ; Khadraoui, D.” Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems”, Published in: Information and Communication Technologies for Disaster Management (ICT-DM), 2014 1st International Conference on Date of Conference: 24-25 March 2014 Page(s): 1 – 8.
[6] Soares, V.N.G.J. ; NetGNA Group, Inst. de Telecomun., Portugal ; Farahmand, F. ; Rodrigues, J.J.P.C.” Evaluating the Impact of Storage Capacity Constraints on Vehicular Delay-Tolerant Networks”, Published in: Communication Theory, Reliability, and Quality of Service, 2009. CTRQ '09. Second International Conference on Date of Conference: 20-25 July 2009 Page(s): 75 – 80.
[7] Jing Su ; Dept. of Comput. Sci., Toronto Univ., Ont. ; Goel, A. ; de Lara, E.” An Empirical Evaluation of the Student-Net Delay Tolerant Network” Published in: Mobile and Ubiquitous Systems: Networking & Services, 2006 Third Annual International Conference on Date of Conference: July 2006 Page(s): 1 – 10.
[8] Jing Su ; Dept. of Comput. Sci., Toronto Univ., Ont. ; Goel, A. ; de Lara, E.” An Empirical Evaluation of the Student-Net Delay Tolerant Network” Published in: Mobile and Ubiquitous Systems - Workshops, 2006. 3rd Annual International Conference on Date of Conference: 17-21 July 2006 Page(s): 1 – 10.
[9] Juanjuan Gu ; Sch. of Math. & Syst. Sci., Beihang Univ., Beijing, China ; Haiquan Wang ; Weijian Ma ; Dan Liu” Modeling and delay analysis for urban vehicular delay-tolerant networks” Published in: Communication Software and Networks (ICCSN), 2015 IEEE International Conference on Date of Conference: 6-7 June 2015 Page(s): 287 – 293.
[10] Uchida, N. ; Dept. of Informational Soc. Studies, Saitama Inst. of Technol., Fukaya, Japan ; Kawamura, N. ; Williams, N. ; Takahata, K.” Proposal of Delay Tolerant Network with Cognitive Wireless Network for Disaster Information Network System”, Published in: Advanced Information Networking and Applications Workshops (WAINA), 2013 27th International Conference on Date of Conference: 25-28 March 2013 Page(s): 249 – 254.
[11] Zebo Feng ; Dept. of Inf. Security, Naval Univ. of Eng., Wuhan, China ; Xiaoping Wu ; Liangli Ma ; Wei Ren” Establishing the security foundations for network protocol design”, Published in: Communication Technology (ICCT), 2012 IEEE 14th International Conference on Date of Conference: 9-11 Nov. 2012 Page(s): 789 – 793.
[12] Bhatti, S. ; Sch. of Comput. Sci., Univ. of St. Andrews, St. Andrews, UK ; Brady, E. ; Hammond, K. ; McKinna, J.” Domain Specific Languages (DSLs) for Network Protocols (Position Paper)”, Published in: Distributed Computing Systems Workshops, 2009. ICDCS Workshops '09. 29th IEEE International Conference on Date of Conference: 22-26 June 2009 Page(s): 208 – 213.
[13] Bocking, S. ; Corp. Res. & Dev., Siemens AG, Munich, Germany” Object-oriented network protocols”, Published in: INFOCOM '97. Sixteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Driving the Information Revolution., Proceedings IEEE (Volume:3) Date of Conference: 7-12 Apr 1997 Page(s): 1245 - 1252 vol.3.
[14] Pham, T. ; Dept of Comput. Sci., San Jose State Univ., CA, USA ; Eun Jik Kim ; Moh, M.” On data aggregation quality and energy efficiency of wireless sensor network protocols - extended summary”, Published in: Broadband Networks, 2004. BroadNets 2004. Proceedings. First International Conference on Date of Conference: 25-29 Oct. 2004 Page(s): 730 – 732.
[15] Green, C.J. ; Appl. Machine Intelligence, San Juan Capistrano, CA, USA,” Protocols for a self-healing network”, Published in: Military Communications Conference, 1995. MILCOM '95, Conference Record, IEEE (Volume:1 ) Date of Conference: 6 Nov 1995 Page(s): 252 - 256 vol.1.
Citation
R.Sathya and A.Senthil Kumar, "Attack Identification Based On Routing And Nonce Approach," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.146-151, 2015.
Settlement Evaluation of Single Heaps Subjected to Uncovering Underneath Existing Structures in Delicate Soil
Research Paper | Journal Paper
Vol.3 , Issue.11 , pp.152-158, Nov-2015
Abstract
Concerning the issue of settlement which actualized by extra uncovering under the cellar of high-rise buildings, the proposed approach is provided for a straightforward furthermore, existed heap in delicate soil. This paper presents a straightforward approach for the analyze of the behaviour of single heaps by adopting two models. One model uses the horizontal resistance softening model to mimic the load exchange capacity of heap side, furthermore, the other model adopts the indirect solidifying relationship to present the properties of sediments in heap end. Based on the load exchange method, the figuring of settlement of single heaps is put forward. Furthermore, the load-settlement bends of single heaps are gotten by an iterative procedure. Furthermore, analyzing the significant parameters furthermore, comparing with other technique are given to verify the practicality of this proposal. In this paper, the fundamental focuses of the parametric studies include the heap horizontal firmness bend with diverse uncovering depth, the impact of the heap side grating resistance furthermore, the evolution of load furthermore, settlement. To a straightforward heap subjected to uncovering underneath existing structures on delicate soil, this paper is capable to get a quick estimate of the settlement.
Key-Words / Index Term
Existing Buildings; Further Uncovering under Basement; Settlement; Extreme Side Friction.
References
[1] Robinson, I.A.; Nat. Phys. Lab., Teddington, UK; Kibble, B.P." Further progress in relating the kilogram to h with the NPL watt balance" Published in: Precision Electromagnetic Measurements Digest, 2000 Conference on Date of Conference: 14-19 May 2000 Page(s): 540 – 541.
[2] Cliff, D.; Dept. of Comput. Sci., Univ. of Bristol, Bristol "ZIP60: Further Explorations in the Evolutionary Design of Trader Agents and Online Auction-Market Mechanisms" Published in: Evolutionary Computation, IEEE Transactions on (Volume: 13, Issue: 1) Date of Publication: Feb. 2009 Page(s): 3 – 18.
[3] Wood, R.W. ; Ampex Corp., Redwood City, CA, USA "Further Comments on the Characteristics of the Hedeman H-1, H-2, and H-3 Codes " Published in: Communications, IEEE Transactions on (Volume:31 , Issue: 1 ) Date of Publication : Jan 1983 Page(s): 105 – 110.
[4] Luo, Weilin; Dept. of Electr. & Comput. Eng., Auburn Univ., AL, USA; Tugnait, J.K. "Further results on blind equalization and estimation of SIMO time-varying channels” Published in: Circuits and Systems, 2002. ISCAS 2002. IEEE International Symposium on (Volume: 1) Date of Conference: 2002 Page(s): I-853 - I-856 vol.1.
[5] Francavilla, T.L.; US Naval Res. Lab., Washington, DC, USA; Nelson, H.H.; Baronavski, A.P.; Wolf, S.A. "Further studies of a laser quenched superconducting opening switch” Published in: Magnetics, IEEE Transactions on (Volume: 25, Issue: 2) Date of Publication: Mar 1989 Page(s): 1996 – 1999.
[6] Qingquan Yu; Coll. of Civil Eng., Sanjing Univ., Nanjing, China; Weiming Gong "The performance of the side-friction resistance of large diameter bored pile " Published in: Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conference on Date of Conference: 24-26 June 2011 Page(s): 2711 – 2714.
[7] Wenjie Chen; Robot Lab., FANUC Corp., Oshino-mura, Japan; Kyoungchul Kong; Tomizuka, M. "Dual-Stage Adaptive Friction Compensation for Precise Load Side Position Tracking of Indirect Drive Mechanisms " Published in: Control Systems Technology, IEEE Transactions on (Volume:23 , Issue: 1 ) Date of Publication : 06 May 2014 Page(s): 164 – 175.
[8] Chunlin He; Dept. Civil Eng., Huaiyin Inst. of Technol., Huaian, China ; Chengzhong Gong " Test and analysis on load-bearing characteristics of two types of long piles " Published in: Remote Sensing, Environment and Transportation Engineering (RSETE), 2011 International Conference on Date of Conference: 24-26 June 2011 Page(s): 1750 – 1753.
[9] Kun Qian; Beijing Jiaotong Univ., Beijing, China; Quan Yuan; Panfeng Ba; Xinying Xie "The analysis of excavation influence on the bearing capacity of nearing friction piles " Published in: Multimedia Technology (ICMT), 2011 International Conference on Date of Conference: 26-28 July 2011 Page(s): 4672 – 4675.
[10] Jin Wei ; Sch. of Highway, Chang'an Univ., Xi'an, China ; Zhe Li "Study on large-scale in-situ immersion static load test for bearing behavior of collapsible loess pile foundation " Published in: Electronic and Mechanical Engineering and Information Technology (EMEIT), 2011 International Conference on (Volume:5 ) Date of Conference: 12-14 Aug. 2011 Page(s): 2544 – 2547.
[11] Chia-Liang Weng ; National Kaohsiung First University of Science and Technology, The University of Tokyo, clweng@ccms.nkfust.edu.tw ; Yashiro, T. " A Methodology of Estimation to Accumulated Resources and Dismantling Materials from the Existing Building Stock " Published in: Environmentally Conscious Design and Inverse Manufacturing, 2005. Eco Design 2005. Fourth International Symposium on Date of Conference: 12-14 Dec. 2005 Page(s): 840 – 841.
[12] Tan Joo Shiuh ; Intel Product(M) Sdn. Bhd., Kulim, Malaysia ; Shigeru, U. ; Loh Chin Ling " 1st LEED certified green building for existing building operation and maintenance for semiconductor industry " Published in: Semiconductor Manufacturing (ISSM), 2010 International Symposium on Date of Conference: 18-20 Oct. 2010 Page(s): 1 – 3.
[13] Hsiao, R.S.; Grad. Inst. of Comput. & Commun. Eng., Nat. Taipei Univ. of Technol., Taipei, Taiwan ; Lin, D.B. ; Lin, H.P. ; Chung, C.H. more authors "Integrating ZigBee lighting control into existing building automation systems " Published in: Information Science and Control Engineering 2012 (ICISCE 2012), IET International Conference on Date of Conference: 7-9 Dec. 2012 Page(s): 1 – 5.
[14] Zeng Xu-dong ; Coll. of Archit. & Urban Planning, Chongqing, China ; Qin Yuan-yuan "Optimized design of existing building based on energy-saving and low-carbon — A case study of the 4th canteen of Chongqing University"Published in: Electric Technology and Civil Engineering (ICETCE), 2011 International Conference on Date of Conference: 22-24 April 2011 Page(s): 6735 – 6738.
[15] Ying Han; Sch. of Environ. Sci. & Eng., Tianjin Univ., Tianjin, China ; Neng Zhu "Economic Efficiency Analysis of Energy Efficiency retrofit for existing residential building in Tangshan, China " Published in: Industrial Engineering and Engineering Management (IE&EM), 2010 IEEE 17Th International Conference on Date of Conference: 29-31 Oct. 2010 Page(s): 200 – 203.
Citation
M.Ravichandran and K.R.Keerthiraman, "Settlement Evaluation of Single Heaps Subjected to Uncovering Underneath Existing Structures in Delicate Soil," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.152-158, 2015.
A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure
Review Paper | Journal Paper
Vol.3 , Issue.11 , pp.159-164, Nov-2015
Abstract
Intrusion detection system (IDS) has been utilized as a vital instrument in defending the Framework from this pernicious or typical activity. it is still desirable to know what interruptions have happened or are happening, so that we can understand the security dangers and dangers and consequently be better arranged for future assaults With the capacity to analyze Framework movement and perceive incoming and ongoing Framework attack, majority of Framework administrator has turn to IDS to help them in recognizing inconsistencies in Framework movement In this paper, we focus on diverse sorts of assaults on IDS this paper gives a depiction of diverse assault on diverse convention such as TCP ,UDP,ARP and ICMP.
Key-Words / Index Term
Attack, DoS, Interruption Identification , NIDS, Protocols.
References
[1] KrishnaKumar, B. ; Dept. of Electron. & Commun. Eng., PET Eng. Coll., Thirunelvelli, India ; Kumar, P.K. ; Sukanesh, R. "Hop Count Based Packet Processing Approach to Counter DDoS Attacks" Published in: Recent Trends in Information, Telecommunication and Computing (ITC), 2010 International Conference on Date of Conference: 12-13 March 2010 Page(s): 271 - 273.
[2] Yu-Chung Huang ; Dept. of Comput. Sci. & Inf. Eng., Nat. Central Univ., Jhongli, Taiwan ; Jehn-Ruey Jiang " Efficient Ultralightweight RFID Mutual Authentication" Published in: Internet of Things (iThings), 2014 IEEE International Conference on, and Green Computing and Communications (GreenCom), IEEE and Cyber, Physical and Social Computing(CPSCom), IEEE Date of Conference: 1-3 Sept. 2014 Page(s): 102 - 108.
[3] Liu, Sisi ; University of Arizona, Tucson ; Lazos, Loukas ; Krunz, Marwan "Thwarting Control-Channel Jamming Attacks from Inside Jammers" Published in: Mobile Computing, IEEE Transactions on (Volume:11 , Issue: 9 ) Date of Publication : 04 August 2011 Page(s): 1545 - 1558.
[4] Zhao Wang ; Key Lab. of High Confidence Software Technol., MoE, Beijing, China ; Xuesong Zhang ; Zhong Chen "Rapdos: A RFID Authentication Protocol for Defending against DoS" Published in: Computational and Information Sciences (ICCIS), 2012 Fourth International Conference on Date of Conference: 17-19 Aug. 2012 Page(s): 1042 - 1045.
[5] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi Nan Univ., Puli "DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols" Published in: Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE Date of Conference: 9-12 Dec. 2008 Page(s): 615 - 622.
[6] Gianluigi Me ; Dipt. di Informatica, Sistemi e Produzione, Rome Univ., Italy "Exploiting buffer overflows over Bluetooth: the BluePass tool" Published in: Wireless and Optical Communications Networks, 2005. WOCN 2005. Second IFIP International Conference on Date of Conference: 6-8 March 2005 Page(s): 66 - 70.
[7] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi Nan Univ., Puli "Varying Pseudonyms-Based RFID Authentication Protocols with DOS Attacks Resistance" Published in: Asia-Pacific Services Computing Conference, 2008. APSCC '08. IEEE Date of Conference: 9-12 Dec. 2008 Page(s): 607 - 614.
[8] Jyothi, Vinayaka ; ECE Department, NYU Polytechnic School of Engineering, Brooklyn, New York, USA ; Addepalli, Sateesh K. ; Karri, Ramesh "Deep Packet Field Extraction Engine (DPFEE): A pre-processor for network intrusion detection and denial-of-service detection systems" Published in: Computer Design (ICCD), 2015 33rd IEEE International Conference on Date of Conference: 18-21 Oct. 2015 Page(s): 266 - 272.
[9] Mikki, M. ; Comput. Eng. Dept., Islamic Univ. of Gaza, Gaza, Palestinian Authority ; Mansour, Y.M. ; Kangbin Yim "Privacy Preserving Secure Communication Protocol for Vehicular Ad Hoc Networks" Published in: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on Date of Conference: 3-5 July 2013 Page(s): 188 - 195.
[10] Conti, Mauro ; Dipartimento di Inf., Univ. di Roma La Sapienza, Rome ; Pietro, Roberto Di ; Mancini, Luigi Vincenzo ; Spognardi, Angelo "RIPP-FS: An RFID Identification, Privacy Preserving Protocol with Forward Secrecy" Published in: Pervasive Computing and Communications Workshops, 2007. PerCom Workshops '07. Fifth Annual IEEE International Conference on Date of Conference: 19-23 March 2007 Page(s): 229 - 234.
[11] Chin-Chen Chang ; Dept. Inf. Eng. & Comput. Sci., Feng Chia Univ. Taichung, Taichung, Taiwan ; Wei-Yi Chen ; Ting-Fang Cheng "A Secure RFID Mutual Authentication Protocol Conforming to EPC Class 1 Generation 2 Standard" Published in: Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP), 2014 Tenth International Conference on Date of Conference: 27-29 Aug. 2014 Page(s): 642 - 645.
[12] Kara, A. ; Dept. of Comput. Sci. & Eng., Aizu Univ., Fukushima, Japan ; Suzuki, T. ; Takahashi, K. ; Yoshikawa, M. "A DoS-vulnerability analysis of L2TP-VPN" Published in: Computer and Information Technology, 2004. CIT '04. The Fourth International Conference on Date of Conference: 14-16 Sept. 2004 Page(s): 397 - 402.
[13] Mobahat, H. ; LuLea Univ. of Technol., Lulea, Sweden "Authentication and lightweight cryptography in low cost RFID" Published in: Software Technology and Engineering (ICSTE), 2010 2nd International Conference on (Volume:2 ) Date of Conference: 3-5 Oct. 2010 Page(s): V2-123 - V2-129.
[14] Onen, M. ; Instn. Eurecom, Sophia-Antipolis, France ; Molva, R. "Denial of service prevention in satellite networks" Published in: Communications, 2004 IEEE International Conference on (Volume:7 ) Date of Conference: 20-24 June 2004 Page(s): 4387 - 4391 Vol.7.
[15] Zavvari, A. ; Dept. of Electr. Electron. & Syst. Eng., Univ. Kebangsaan Malaysia, Bangi, Malaysia ; Islam, M.T. ; Shakiba, M. ; Mandeep, S.J. "Theoretical analysis of RFID security protocols" Published in: Industrial Engineering and Engineering Management (IEEM), 2014 IEEE International Conference on Date of Conference: 9-12 Dec. 2014 Page(s): 302 - 306.
[16] Sajjadi Jahromi, S.H. ; Neyriz Branch, Islamic Azad Univ., Neyriz, Iran ; Mehraban Jahromi, M.H. "Optimization of User Identification Scheme with Preserving User Anonymity" Published in: Mechanical and Electrical Technology (ICMET), 2010 2nd International Conference on Date of Conference: 10-12 Sept. 2010 Page(s): 462 - 466.
[17] Bin Wang ; Sch. of Electr. & Electron. Eng., Nanyang Technol. Univ., Singapore, Singapore ; Maode Ma "A Server Independent Authentication Scheme for RFID Systems" Published in: Industrial Informatics, IEEE Transactions on (Volume:8 , Issue: 3 ) Date of Publication : 26 January 2012 Page(s): 689 - 696.
[18] Jia-Ning Luo ; Inf. & Telecommun., Ming Chuan Univ., Taoyuan, Taiwan ; Ming-Hour Yang "An efficient delegation protocol in mobile RFID networks" Published in: Information Security and Intelligence Control (ISIC), 2012 International Conference on Date of Conference: 14-16 Aug. 2012 Page(s): 160 - 163.
[19] Hung-Yu Chien ; Dept. of Inf. Manage., Nat. Chi-Nan Univ., Nantou, Taiwan ; Chin-I Lee ; Shyr-Kuen Chen ; Hung-Pin Hou "New RFID Authentication Protocol with DOS-attack Resistance" Published in: Parallel and Distributed Systems (ICPADS), 2011 IEEE 17th International Conference on Date of Conference: 7-9 Dec. 2011 Page(s): 605 - 609.
[20] Abughazalah, S. ; Smart Card Centre-Inf. Security Group (SCC-ISG), Univ. of London, Egham, UK ; Markantonakis, K. ; Mayes, K. "A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA" Published in: Internet Technology and Secured Transactions (ICITST), 2013 8th International Conference for Date of Conference: 9-12 Dec. 2013 Page(s): 44 - 51.
Citation
R.Elamaran and R.Mala, "A Study on Network Intrusion Detection Systems (NIDSs) In Virtual Network Structure," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.159-164, 2015.
A Survey of An Operative Device Aimed at Crop Approximation in the Agricultural Subdivision
Review Paper | Journal Paper
Vol.3 , Issue.11 , pp.165-170, Nov-2015
Abstract
Agriculture is a business with risk. Crop creation depends on climatic, geographical, biological, political and monetary factors. Since of these elements there are some risks, which can be quantified when applied fitting mathematical or factual methodologies. Actually precise data about the nature of chronicled yield of crop is vital modelling input, which are helpful to ranchers & Government association for choice making process in establishing proper policies. The advances in computing and data storage hove provided vast at most of data. The challenge has been to extract learning from this crude data; this has led to new strategies and frameworks such as data mining that can bridge the learning of the data to the crop yield estimation. This research aimed to assess these new data mining frameworks and apply them to the different variables consisting in the database to establish if meaningful connections can be found.
Key-Words / Index Term
Yield Estimation, Data Mining, Relapse Analysis, Crop Cutting Experiments
References
[1] Wei Wang ; Sch. of Resources & Environ. Sci., Hubei Univ., Wuhan, China ; Quanfang Wang ; Huaying Wu ; Yuanyuan Chen , "Yield estimation of semilate rice using remote sensing data in Honghu city, China", Published in: Agro-Geoinformatics (Agro-Geoinformatics), 2013 Second International Conference on Date of Conference: 12-16 Aug. 2013 Page(s): 135 - 138.
[2] Srinivasan, S.P. ; Fac. of Mech. Eng., Rajalakshmi Eng. Coll., Chennai, India ; "An estimation of jatropha yield as an alternate fuel resource through the concatenated rule sets",Published in: Industrial Engineering and Engineering Management (IE&EM), 2011 IEEE 18Th International Conference on (Volume:Part 3 ) Date of Conference: 3-5 Sept. 2011 Page(s): 2138 - 2142.
[3] Wenpeng Lin ; Dept. of Geogr., Shanghai Normal Univ., Shanghai ; Min Zhao ; Yunlong Liu ; Jun Gao ," Winter wheat yield estimation model with MODIS normalized near-infrared spectral index",Published in: Earth Observation and Remote Sensing Applications, 2008. EORSA 2008. International Workshop on Date of Conference: June 30 2008-July 2 2008 Page(s): 1 - 4.
[4] Yi Zhou ; Inst. of Remote Sensing Applications, Chinese Acad. of Sci., Beijing, China ; Shixin Wang ; Weiqi Zhou ; Jun Yan ," Crop division of yield estimation in China by remote sensing and its characteristics",Published in: Geoscience and Remote Sensing Symposium, 2003. IGARSS '03. Proceedings. 2003 IEEE International (Volume:4 ) Date of Conference: 21-25 July 2003 Page(s): 2245 - 2247 vol.4.
[5] Jie Ren ; Sch. of Econ. & Manage., Wuhan Univ., Wuhan,"Corporate Bond Yield Curve Estimation using Parametric Approach",Published in: Wireless Communications, Networking and Mobile Computing, 2008. WiCOM '08. 4th International Conference on Date of Conference: 12-14 Oct. 2008 Page(s): 1 – 4.
[6] Wang, Guoyin ; Inst. of Comput. Sci. & Technol., Chongqing Univ. of Posts & Telecommun., Chongqing ; Jun Hu ; Qinghua Zhang ; Xianquan Liu," Granular computing based data mining in the views of rough set and fuzzy set",Published in: Granular Computing, 2008. GrC 008. IEEE International Conference on Date of Conference: 26-28 Aug. 2008 Page(s): 67.
[7] Jagannathan, G. ; Rutgers Univ., Piscataway ; Wright, R.N., "Seventh IEEE International Conference on Data Mining Workshops - Title",Published in: Data Mining Workshops, 2007. ICDM Workshops 2007. Seventh IEEE International Conference on Date of Conference: 28-31 Oct. 2007 Page(s): i - iii.
[8] Lei Xu ; Dept. of Electron. Eng., Tsinghua Univ., Beijing, China ; Chunxiao Jiang ; Jian Wang ; Jian Yuan , "Information Security in Big Data: Privacy and Data Mining",Published in: Access, IEEE (Volume:2 ) Page(s): 1149 - 1176.
[9] Refonaa, J. ; Dept. of Comput. Sci. & Engineeering, Sathyabama Univ., Chennai, India ; Lakshmi, M. ; Vivek, V.," Analysis and prediction of natural disaster using spatial data mining technique",Published in: Circuit, Power and Computing Technologies (ICCPCT), 2015 International Conference on Date of Conference: 19-20 March 2015 Page(s): 1 - 6.
[10] Shen Bin ; Ningbo Inst. of Technol., Zhejiang Univ., Ningbo, China ; Liu Yuan ; Wang Xiaoyi, "Research on data mining models for the internet of things",Published in: Image Analysis and Signal Processing (IASP), 2010 International Conference on Date of Conference: 9-11 April 2010 Page(s): 127 - 132.
[11] Novak, D. ; Dept. Of Cybern., Czech Tech. Univ. In Prague, Prague, Czech Republic ; Albert, F. ; Spaniel, F.,” Analysis of actigraph parameters for relapse prediction in bipolar disorder: A feasibility study”, Published in: Engineering in Medicine and Biology Society (EMBC), 2014 36th Annual International Conference of the IEEE,Date of Conference:26-30 Aug. 2014,Page(s):4972 – 4975.
[12] Exarchos, K.P. ; Dept of Mater. Sci. & Eng., Univ. Of Ioannina, Ioannina, Greece ; Rigas, G. ; Goletsis, Y. ; Fotiadis, D.I.,” Towards building a Dynamic Bayesian Network for monitoring oral cancer progression using time-course gene expression data”, Published in:Information Technology and Applications in Biomedicine (ITAB), 2010 10th IEEE International Conference on Date of Conference:3-5 Nov. 2010,Page(s):1 – 4.
[13] Acciani, G. ; Dipartimento di Elettrotecnica ed Elettronica, Politecnico di Bari, Italy ; Bellomo, A. ; Chiarantoni, E. ; Paradiso, A.,” Validation of neural network analysis to predict prognosis in breast cancer patients”, Published in: Circuits and Systems, 1993., Proceedings of the 36th Midwest Symposium on,Date of Conference:16-18 Aug 1993,Page(s):453 - 456 vol.1.
[14] Aziz, Azizi A. ; Klein, M.C.A. ; Treur, J.,” Modeling an Ambient Agent to Support Depression Relapse Prevention”, Published in:Web Intelligence and Intelligent Agent Technologies, 2009. WI-IAT '09. IEEE/WIC/ACM International Joint Conferences on (Volume:3 ),Date of Conference:15-18 Sept. 2009, Page(s):335 – 340.
[15] Anderson, P.E. ; Dept. Of Comput. Sci., Coll. Of Charleston, Charleston, SC, USA ; Paul, M.R. ; mccaffrey, V.A. ; Wilson, R. ,” Predictive modeling of lung cancer recurrence using alternative splicing events versus differential expression data”, Published in:Computational Intelligence in Bioinformatics and Computational Biology, 2014 IEEE Conference on,Date of Conference:21-24 May 2014,Page(s):1 – 8.
Citation
P.Sharmila Devi and R.Periyasamy , "A Survey of An Operative Device Aimed at Crop Approximation in the Agricultural Subdivision," International Journal of Computer Sciences and Engineering, Vol.3, Issue.11, pp.165-170, 2015.