Comparative Study of Intrusion Detection System
Review Paper | Journal Paper
Vol.2 , Issue.4 , pp.197-200, Apr-2014
Abstract
In past few decades, there has been rapid progress in internet based technology and application areas for computer networks have emerged. But number of attacks on network has increased dramatically due to which interest of researchers in the network intrusion detection has also increased. Intrusion detection is a type of security management system for computers and networks. An intrusion detection system gathers and analyzes information from various areas within computer or network to identify possible security breaches, which include both intrusion and misuse. Intrusion detection system also helps in detecting anomalies in network traffic. Intrusion Detection system follows a two-step process. The first procedures are host-based and are considered the passive component, these include: inspection of the system`s configuration files to detect inadvisable settings; inspection of the password files to detect inadvisable passwords; and inspection of other system areas to detect policy violations. The second procedures are network-based and are considered the active component: mechanisms are set in place to reenact known methods of attack and to record system responses. Aim of this research paper is to review current trends in intrusion detection system and analyze current problems that exist in this area. Some key features, attacks detected by different types of IDs are explained in this paper.
Key-Words / Index Term
Detection Methods , Intrusion Detection , Types Of Attacks, Mechanism
References
[1] N. Puketza, K. Zhang, M. Chung, B. Mukherjee and R. A. Olsson �A methodology for testing intrusion detection systems," Proc. IEEE Transactions on Software Engineering, vol. 22, pp. 719 -729, 1996.
[2] Amrita Anand and Brijesh Patel, �An Overview on Intrusion Detection System and Types of Attacks It Can Detect Considering Different Protocols�, Proc. Ijarcsse Volume2, August2012, pp.310-325.
[3] J. R. Winkler and W. J. Page�Intrusion and Anomaly Detection in Trusted Systems," Proc. Fifth Annual Computer Security Applications Conference, 1989.
[4] D. E. Denning "An intrusion-detection model," IEEE Trans. on Software Engg., vol. SE-13, pp.222 -232 1987
[5] F. Cuppens and A. Miege, "Alert Correlation in a Cooperative Intrusion Detection Framework," Proc. IEEE Symp. Security and Privacy, pp. 202-215, May 2002.
[6] R. Durst, T. Champion, B. Witten, E. Miller and L. Spagnuolo, "Addendum to Testing and Evaluating Computer Intrusion Detection Systems," Proc. Comm. ACM, vol. 42, no. 9, p. 15, Sept. 1999.
[7] R. Lippmann, D. Fried, I. Graf, J. Haines, K. Kendall, D. McClung, D. Weber, S. Webster, D. Wyschogrod, R. Cunningham and M. Zissman, "Evaluating Intrusion Detection Systems: The 1998 DARPA Off-Line Intrusion Detection Evaluation," Proc. DARPA Information Survivability Conf. and Exposition, vol. 2, pp. 12-26, Jan. 2000.
[8] Karmore, Preetee K.; Bodkhe, Sonali T, �A Survey on Intrusion in Ad Hoc Networks and its Detection Measures,� Proc. International Journal on Computer Science & Engineering, 2011, vol. 3, Issue 5, pp. 1896-1903.
Citation
M. Chowdhary, S. Suri, M. Bhutani, "Comparative Study of Intrusion Detection System," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.197-200, 2014.
Comparative Analysis of various Performance Functions for Training a Neural Network
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.201-205, Apr-2014
Abstract
Handwriting Recognition (or HWR) is the ability of a computer to receive and interpret comprehensible handwritten input from sources such as paper documents, photographs, touch-screens and other devices. The image of the written text may be sensed "Offline" from a piece of paper by optical scanning (optical character recognition) or intelligent word recognition. Neural Network concept is the most efficient recognition tool which is dependent on sample learning. Mean square error function is the basic performance function which is most broadly used and affects the network directly. Various performance functions are being evaluated in this paper so as to get a conclusion as to which performance function would be effective for usage in the network so as to produce an efficient and effective system. The training of back propagation neural network is done with the application of Offline Handwritten Character Recognition using MATLAB simulator.
Key-Words / Index Term
Back Propagation Algorithm, Performance Function, Mean Square Error Algorithm
References
[1] Bogdan M. Wilamowski, Serdar Iplikci, Okyay Kaynak, M. �nder Efe , �An Algorithm for Fast Convergence in Training Neural�, 0-7803-7044-9/01/$10.00 � IEEE , 2001.
[2] Hussein Rady, Reyni�s, �Entropy and Mean Square Error for Improving the Convergence of Multilayer Backpropagation Neural Networks: A Comparative, Study�, 117905-8282 IJECS-IJENS, Vol: 11, No: 05, October-2005.
[3] Hossam Osman, Steven D. Blostan, �New cost function for Backpropagation neural network with application to SAR imagery classification�, K7l396.
[4] G. R. Finnie and G.E. Wittig, �A Comparison of Software Effort Estimation Techniques: Using Function Points with Neural Networks, Case Based Reasoning and Regression Models,� Journal of Systems and Software, vol.39, pp.281-289, 1997.
[5] G. R. Finnie and G.E. Wittig, �AI Tools for Software Development Effort Estimation,� Proceedings of the International Conference on Software Engineering: Education and Practice , SEPT- 1996.
[6] K. Srinivasan and D. Fisher, �Machine Learning Approaches to Estimating Software Development Effort,� IEEE Transactions on Software Engineering, vol.21, Feb-1995.
[7] Sandhya Arora, Debotosh Bhattacharjee, Mita Nasipuri, L. Malik , M. Kundu and D. K. Basu, � Performance Comparison of SVM and ANN for Handwritten Devnagari Character Recognition� , IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 3, May-2010.
[8] Srinivasa kumar devireddy, Settipalli appa rao, �Hand written character recognition using backpropagation network�, Journal of Theoretical and Applied Information Technology(JATIT) , 2005 - 2009.
[9] Madhu Shahi, Dr. Anil K Ahlawat, Mr. B.N Pandey , �Literature Survey on Offline Recognition of Handwritten Hindi Curve Script Using ANN Approach� ,International Journal of Scientific and Research Publications, Volume 2, Issue 5,ISSN 2250-3153, May- 2012.
[10] Naveen Garg, Sandeep Kaur, �Improvement in Efficiency of Recognition of Handwritten Gurumukhi Script� ,IJCST Vol. 2, Issue 3, September-2011.
[11] Rakesh Kumar Mandal and N R Manna, "Handwritten English Character Recognition using Pixel Density Gradient Method", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (1-8), Mar -2014.
Citation
S. Kumar, V.K. Mishra, S. Singh, N. Vimal , "Comparative Analysis of various Performance Functions for Training a Neural Network," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.201-205, 2014.
GOLL: A Methodology for the Simulation of the Producer Consumer Problem
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.206-209, Apr-2014
Abstract
Many stenographers would agree that, had it not been for virtual machines, the simulation of Web services might never have occurred. Given the status of signed configurations, researchers daringly desire the evaluation of write-ahead logging. GOLL, our new solution for the analysis of von Neumann machines, is the solution to all of these issues. Our solution is related with electronic modalities, randomized algorithms and client-server modalities. We argued not only that information retrieval systems and access points are mostly incompatible, but that the same is true for congestion control. So, In this paper we have implemented a optimized method to overcome producer- consumer problem.
Key-Words / Index Term
Artificial Intelligence ; Clustering ; B-Tree; Fuzzy Logic
References
[1] Bhabha, X. Psychoacoustic, self-learning information. In Proceedings of INFOCOM (May 2001).
[2] Chomsky, N., And Stearns , R. Emulating IPv4 and extreme programming with Myolin. Journal of Large-Scale, Adaptive Commu-nication 87 (Oct. 2005), 20�24.
[3] Cocke, J., Knuth, D., Lamport, L., And Jones , Q. Decoupling randomized algorithms from symmetric encryption in checksums. In Proceedings of ECOOP (Aug. 1995).
[4] Cook, S., Knuth, D., White, D., Cook, S., And Patterson, D. BrawnyBertha: Simulation of Internet QoS. Journal of Concurrent, Ubiquitous, Robust Modalities 5 (Mar. 1994), 20�24.
[5] Fredrick P. Brooks , J. A case for XML. In Proceedings of the Conference on Linear-Time Methodologies (Sept. 2004).
[6] Gray, J., And Clarke, E. Cornist: Investigation of checksums. In Proceedings of IPTPS (June 2002).
[7] Lakshminarayanan, K., Milner, R., And Nygaard, K. Optimal, reliable, unstable models for erasure coding. Tech. Rep. 16-17, IBM Research, Oct. 2003.
[8] Martin, C. Investigation of XML. Tech. Rep. 87, IBM Research, Aug. 1996.
[9] Martinez, S., Balakrishnan, D., And Singh, V. Object-oriented languages considered harmful. Tech. Rep. 194, MIT CSAIL, Feb. 1999.
[10] Nehru, S., Corbato, F., Reddy, R., And Subramanian, L. Ex-ploring kernels and Smalltalk with Goober. In Proceedings of PODS (July 1997).
[11] Ritchie, D., And Sun, B. Enabling 802.11b using highly-available symmetries. In Proceedings of PLDI (June 1999).
[12] SIMON, H. The impact of linear-time methodologies on algorithms. In Proceedings of PLDI (Dec. 2004).
[13] Singh, V., And Smith, J. Decoupling cache coherence from Internet QoS in Byzantine fault tolerance. Journal of Stochastic Modalities 20
(Apr. 2001), 20�24.
[14] Suzuki , E., And Hawking, S. Constructing web browsers and cache coherence. In Proceedings of the USENIX Technical Conference (May 1999).
[15] Thompson, X. N., Schroedinger, E., Floyd, S., Singh, V., JackSon, F., And Brown, W. Dika: A methodology for the improvement of Smalltalk. In Proceedings of the Workshop on Efficient, Probabilistic Models (Jan. 1994).
[16] White, P., And Li , L. Refining XML and 802.11 mesh networks. In Proceedings of POPL (Feb. 2003).
[17] Williams , M. F., And Wu, K. Synthesizing e-commerce using empathic symmetries. Journal of Amphibious Archetypes 969 (Sept. 1998), 79�97.
[18] Zhou, W., And Shastri , C. Construction of suffix trees. In Proceedings of the Symposium on Interactive, �Smart� Theor y (July 2005).
[19] V. Ganesh Babu , "Efficient Mobility Using Multicast Routing Mechanisms", International Journal of Computer Sciences and Engineering, Volume-01, Issue-03, Page No (39-46), Nov -2013.
Citation
V. Singh, A. Aggarwal, "GOLL: A Methodology for the Simulation of the Producer Consumer Problem," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.206-209, 2014.
An Approach For Web Log Pre-Processing And Evidence Preservation For Web Mining
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.210-216, Apr-2014
Abstract
The time needed to scrape out any true information is for the most part used on information preprocessing. The information preprocessing stage lays the foundation for information mining with which, the client extricate and distinguish pertinent data from the World Wide Web. In this paper, we examine information preprocessing systems and different steps included in getting the obliged substance adequately. A powerful web log preprocessing technique is constantly proposed for web log preprocessing to concentrate the client designs. The information cleaning method uproots the unessential passages from web log and sifting calculation disposes of the uninterested characteristics from log record.
Key-Words / Index Term
Preprocessing, Web usage, Web log
References
Raza �An Automated User Transparent Approach to log Web URLs for Forensic Analysis� Fifth International Conference on IT Security Incident Management and IT Forensics 2009.
[2] Yan LI, Boqin FENG and Qinjiao MAO, �Research on Path Completion Technique In Web Usage Mining�, IEEE International Symposium On Computer Science and Computational Technology, pp. 554-559, 2008.
[3] Tasawar Hussain, Dr. Sohail Asghar and Nayyer Masood, �Hierarchical Sessionization at Preprocessing Level of WUM Based on Swarm Intelligence �, 6th International Conference on Emerging Technologies (ICET) IEEE, pp. 21-26, 2010.
[4] Doru Tanasa and Brigitte Trousse, �Advanced Data Preprocessing for Intersites Web Usage Mining �, Published by the IEEE Computer Society, pp. 59-65, March/April 2004.
[5] Huiping Peng, �Discovery of Interesting Association Rules Based On Web Usage Mining�, IEEE Coference, pp.272-275, 2010.
[6] Ling Zheng, Hui Gui and Feng Li, � Optimized Data Preprocessing Technology For Web Log Mining�, IEEE International Conference On Computer Design and Applications( ICCDA ), pp. VI-19-VI-21,2010.
[7] JING Chang-bin and Chen Li, � Web Log Data Preprocessing Based On Collaborative Filtering �, IEEE 2nd International Workshop On Education Technology and Computer Science, pp.118-121, 2010.
[8] Bzip2 and libbzip2 project official home page, http://www.bzip.org/ .
[9] gzip official home page, algorithm description, http://www.gzip.org/algorithm.txt.
[10] M. Nelson. Data Compression with the Burrows-Wheeler Transform. In Dr. Dobbs Journal September 1996.
[11] J. Ziv, A. Lamapel. A Universal Algorithm for Sequential Data Compression. In IEEE Transactions on Information Theory, May 1977.
[12] 7 zip project official home page, http://www.7-zip.org.
[13] M. Drini�c, D. Kirovski et al. PPMexe: PPM for Compressing Software. In Proceedings of the Data Compression Conference, IEEE, 2002.
[14] Bal�azs R�ACZ, A. Luk �acs. High density compression of log files. In Proceedings of Data Compression Conference (DCC`04), IEEE Page 557, 2004.
[15] Y. Liang, Y. Y. Zhang et al. Filtering Failure Logs for a Blue Gene/L Prototype. In Proceedings of IEEE International Conference on Dependable Systems and Networks , 2005.
[16] Vijayashri Losarwar, Dr. Madhuri Joshi, Data Preprocessing in Web Usage Mining, International Conference on Artificial Intelligence and Embedded Systems (ICAIES`2012) July 15-16, 2012 Singapore.
[17] D.Vasumathi, D.Vasumathi and K.Suresh, �Effective Web Personalization Using Clustering�, IEEE IAMA, 2009.
[18] Richa Chourasia, Prof. Preeti Choudhary, �A Survey On Web Log Pre-Processing And Evidence Preservation For Web Mining�, International Journal Of Innovative Research In Technology & Science, Volume1, Issue 4, Issn:2321-1156.
Citation
R. Chourasia, P. Choudhary, "An Approach For Web Log Pre-Processing And Evidence Preservation For Web Mining," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.210-216, 2014.
An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.16-20, Apr-2014
Abstract
Introduction should lead the reader to the importance of the study; tie-up published literature with the aims of the study and clearly states the rationale behind the investigation. It should state the purpose and summarize the rationale for the study and gives a concise background. Use references to provide the most salient background rather than an exhaustive review. The last sentence should concisely state your purpose for carrying out the study.
Key-Words / Index Term
Server Time Line Analysis, Server Log, Event Log, Web Analysis
References
[1]. Stephenson, P.: Formal modeling of post-incident root cause analysis. Int. J. Digit. Evid. 2 (2003)
[2]. [2]. Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Invest. 1 (2004)
[3]. Khan M, Chatwin C, Young R. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 2007;4: 146�57.
[4]. Stallard, T.B.:Automated analysis for digital forensic science. Master�s thesis, University of California, Davis (2002)
[5]. Stallard,T.,Levitt,K.N.:Automated analysis for digital forensic science: Semantic integrity checking. In: ACSAC 160�169 (2003)
[6]. Abbott, J., Bell, J., Clark, A., Vel, O.D., Mohay, G.: Automated recognition of event scenarios for digital forensics. In: SAC �06: Proceedings of the 2006 ACM symposium on applied computing pp. 293�300.ACMPress,NewYork (2006)
[7]. Elsaesser, C., Tanner, M.C.: Automated diagnosis for computer forensics. Technical report, The MITRE Corporation (2001)
[8]. Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Proceedings of the 13th annual network and distributed system security symposium. pp. 71�80 (2006)
[9]. Olsson J, Boldt M. Computer forensic timeline visualization tool. Digital Investigation 2009;6(S1):S78�87.
[10]. Gu�j�nsson K. Mastering the super timeline with log2timeline. SANS Reading Room; 2010.
[11]. Bunting. EnCE study guide; 2008. pp. 235�237.
[12]. Buchholz F, Falk C. In: DFRWS, editor. Design and implementation of Zeitline: a forensic timeline; 2005
[13]. Carbone R, Bean C. Generating computer forensic super-timelines under Linux; 2011.
[14]. Sutapat Thiprungsri. Miklos A. Vasarhelyi, Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach, The International Journal of Digital Accounting Research,pp 69-84,2011.
[15]. Gerald Schrenk, Rainer Poisel, �A Discussion of Visualization Techniques for the Analysis of Digital Evidence�, International Conference on Availability, Reliability and Security,pp758-763,2011.
Citation
P. Khatik and P. Choudhary, "An Implementation of Time Line Events Visualization Tool Using Forensic Digger Algorithm," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.16-20, 2014.
Oil Well Health Monitoring and Intelligent Controlling Using Wireless Sensor Network
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.221-224, Apr-2014
Abstract
Most oil pumping units (OPUs) have been using manual control in the oilfield. This existing oil- pumping system has a high power-consuming process and has incapability�s of OPU�s structural health monitoring. Due to the environmental conditions and remote locations of oil sites, it is expensive to physically visit for maintenance and repair. This paper develops a sensor network based intelligent control is proposed for power economy and efficient oil well health monitoring. The system consists of several basic sensors such as voltage sensor, level sensor, MEMS sensor, temperature sensor and gas sensor. The sensed data is given to the ARM controller which processes the oil wells data and it is given to the oil pump control unit which controls the process accordingly. If any abnormality is detected then the fault is informed to the maintenance manager. The malfunction is sent as an SMS to the manager�s mobile via GSM.
Key-Words / Index Term
OPUs, MEMS, Wireless Sensor Networks
References
[1] T. Becker, M. Kluge, J. Schalk, K. Tiplady, C. Paget, U. Hilleringmann,and T. Otterpohl, �Autonomous sensor nodes for aircraft structural healt monitoring,� IEEE Sensors J., vol. 9, no. 11, pp. 1589�1595,Nov. 2009.
[2] M. J. Whelan, M. V. Gangone, and K. D. Janoyan, �Highway bridge assessment using an adaptive real-time wireless sensor network,� IEEE Sensors J., vol. 9, no. 11, pp. 1405�1413, Nov. 2009.
[3] C. Cheng, C. Tse, and F. Lau, �A delay-aware data collection network structure for wireless sensor networks,� IEEE Sensors J., vol. 11, no.1, Apr. 2011.
[4] Q. Ling, Z. Tian, Y. Yin, and Y. Li, �Localized structural health monitoring using energy-efficient wireless sensor networks,� IEEE Sensor J., vol. 9, no. 11, pp. 1596�1604, Nov. 2009.
[5] F. Hu, Y. Xiao, and Q. Hao, �Congestion-aware, loss- resilient biomonitoring sensor networking for mobile health applications,�IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 450�465, Apr. 2009.
[6] N. A. Bertoldo, S. L. Hunter, R. A. Fertig, G. W. Laguna, and D. H. MacQueen, �Development of a real-time radiological area monitoring network for emergency response at Lawrence Livermore National Laboratory,�IEEE Sensors J., vol. 5, no. 4, pp. 56�573, Apr.2005.
[7] F. Hu, Y. Xiao, and Q. Hao, �Congestion-aware, loss- resilient biomonitoring sensor networking for mobile health applications,� IEEE J. Sel. Areas Commun., vol. 27, no. 4, pp. 450�465, Apr. 2009.
[8] M. Venugopal, K. E. Feuvrel, D. Mongin, S. Bambot, M. Faupel, A.Panangadan, A. Talukder, and R. Pidva, �Clinical evaluation of novel interstitial fluid sensor system for remote continuous alcohol monitoring,� IEEE Sensors J., vol. 8, no. 1, pp. 71�80, Jan. 2008.
[9] R.Nathiya and S.G.Santhi, "Energy Efficient Routing with Mobile Collector in Wireless Sensor Networks (WSNs)", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (36-43), Feb -2014.
Citation
Sharmila R, Suganya. A, Gnanavel. G, "Oil Well Health Monitoring and Intelligent Controlling Using Wireless Sensor Network," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.221-224, 2014.
A New Method of Secure Communication with Crystography
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.225-228, Apr-2014
Abstract
In the development of digital communication the need for security of data is often required. In this paper, a new method is Crystography, a combination of Cryptography and Steganography together through image processing. Cryptography is the process of converting the data into gibberish form whereas; Steganography is to embed secret data in a multimedia file as carriers, so that it will not be able to detect that a secret data existing in the file. This system is able to perform both techniques using keys for Cryptography and image as cover objects for Steganography. So, first the data is converted into cipher text using RSA algorithm of Cryptography. Secondly the encrypted data is to be hidden using LSB algorithm of Steganography. By combining both techniques more security is obtained.
Key-Words / Index Term
Crystography, Cryptography, Steganography
References
Ankit Anand and Pushkar Praveen �Implementation of RSA Algorithm on FPGA� International Journal of Engineering Research & Technology (IJERT) Vol. 1 Issue 5, July � 2012.
[2] Chandra M. Kota and Cherif Aissi1� Implementation Of The RSA Algorithm And Its Cryptanalysis� ASEE Gulf-Southwest Annual Conference, The University of Louisiana at Lafayette, March 20 � 22, 2002.
[3] Fadhil Salman Abed A Proposed Method Of Information Hiding Based On Hybrid Cryptography And Steganography in International Journal of application in Engineering and Management, Vol 2, Issue 4, 2013
[4] Gurmeet Kaur and Aarti Kochhar,A �Steganography Implementation Based On LSB & DCT � International Journal for Science and Emerging Technologies with Latest Trends� in vol 4, 2012.
[5] Mihir,H and Rajyaguru �Crystography: combination of cryptography and steganography� in International Journal of Emerging Technology and Advanced Engineering, Volume 2, Issue 10, October 2012.
[6] Inderjeet Kaur �Digital Stegnaography:hiding data within data� in ITM voyager volume 2, no 1, july-dec 2005.
[7] Padmashree,G and Venugopala,P �Audio Steganography and Cryptography: Using LSB Algorithm at 4th and 5th LSB layers� in International Journal Of Engineering and innovative Technology volume 2, issue 4, October 2012.
[8] Samidha Diwedi Sharma and Dipesh Agrawal �Analysis of Random Bit Image Steganography Techniques� in International Journal of Computer Applications 2013.
[9] Po-Yueh Chen* and Hung-Ju Lin �A DWT Based Approach for Image Steganography� in International Journal of Applied Science and Engineering 2006. 4, 3: 275-290
[10] K B Shiva Kumar, "Bit Length Replacement Steganography Based On DCT Coefficients", in International Journal of Engineering Science and Technology, Vol. 2(8), Pg: 3561-3570,2010.
Citation
Suganya A., Sharmila R., Gopinathan N., "A New Method of Secure Communication with Crystography," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.225-228, 2014.
Driver Fatigue Monitoring Using EEG Signal and Gas Seepage Detection
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.229-332, Apr-2014
Abstract
Statistically about 50percent of road accident is due to the driver drowsiness. In this paper, we describe a real time online protocol that controls the vehicle depends on the driver fatigue level. A direct technique is to analyse the EEG (Electroencephalography) signal. An electrode is placed in driver scalp and acquired the EEG signal of driver at every moment, for feature extraction the FFT (Fast Fourier Transform) is used. Then, the feature extracted EEG signal is given to the microcontroller. It can detect the various threshold level of the driver fatigue, then compare and depends upon the driver fatigue level it can control the speed of the vehicle at certain limit. The gas sensor is used to detect the ac gas leakage ,depend on the sensing signal the microcontroller open a car window automatically, in order to reduce the Freon ac gas it mixed with the co2 gas.
Key-Words / Index Term
EEG, EOG, EMG, ECG, FFT, System Architecture
References
[1] Shashank Kulkarni, Kashyap Malthish� Development of Microcontroller Based Ambulatory Instrument to Detect Drowsiness� Nov 2012.
[2] S.Zutao Zhang�,A.Jiashu Zhang �A Novel Vehicle Safety Model : Vehicle speed Controller under driver Fatigue�,VOL.9 No.1 , January 2009.
[3] L.M. King1, H.T. Nguyen1, S. K. L. Lal2 �Early Driver Fatigue Detection from Electroencephalography Signals using Artificial Neural Networks�, Aug 30-Sept 3, 2006.
[4] E. Rogado, J.L. Garc�a, R. Barea, L.M. Bergasa, Member IEEE and E. L�pez " Driver Fatigue Detection System� February 21 - 26, 2009.
[5] Nidhi Sharma, Banga V.K., �Development of Drowsiness Warning System Based on the Fuzzy Logic�, International Journal of Computer Applications (0975-2227), Volume 8-No.9., October 2010.
[6] NHTSA(2009), � Drowsy Driving and Automobile Crashes�, NCSDR/NHTSA Expert Panel on Driver Fatigue and Sleepiness, Washington D. C., June 2009
[7] Mai Suzuki, Nozomi Yamamoto, Osami Yamamoto,T omoaki Nakano and Shin Yamamoto (2006). �Measurement of Driver`s Consciousness by Image Processing-A Method forPresuming Driver`s Drowsiness by Eye-Blinks coping with Individual Differences�.IEEE International Conference on Systems, Man, and Cybernetics,October 8-11 Taipei, Taiwan.
[8] Rangaraj M. Rangayyan, �Biomedical Signal Analysis: A Case Study Approach�, IEEE Press, Wiley Interscience, 2002.
Citation
R. Sharmila, Gnanavel G., Sharmila R., "Driver Fatigue Monitoring Using EEG Signal and Gas Seepage Detection," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.229-332, 2014.
Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks
Review Paper | Journal Paper
Vol.2 , Issue.4 , pp.233-237, Apr-2014
Abstract
MANETs have three types of routing protocols, Reactive protocols, Proactive protocols and Hybrid Protocols. The routing protocols designed majorly for internet are fundamentally different from the mobile Ad-Hoc networks (MANET). In research community very little attention has been given towards performance issues in MANET. This review focuses on MANETs focused mainly on comparing different reactive protocols or proactive protocols.
Key-Words / Index Term
MANETS, Performance Issues, Protocols
References
[1]. Neeraj Kumar Pandey and Amit Kumar Mishra, "An Augmentation in a Readymade Simulators Used for MANET Routing Protocols: Comparison and Analysis", International Journal of Computer Sciences and Engineering, Volume-02, Issue-03, Page No (60-63), Mar -2014
[2]. Dipali D. Punwatkar and Kapil N. Hande, "A Review of Malicious Node Detection in Mobile Ad-hoc Networks", International Journal of Computer Sciences and Engineering, Volume-02, Issue-02, Page No (65-69), Feb -2014
[3]. Deepesh Tamrakar, Sreshtha Bhattacharya and Shitanshu Jain, "A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-02, Issue-02, Page No (1-5), Mar -Apr 2014.
[4]. Leena Pal, Pradeep Sharma and Netram Kaurav, "Performance Analysis of Reactive and Proactive Routing Protocols for Mobile Ad-hoc �Networks", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, Page No (1-4), Nov -Dec 2013.
[5]. Pradeep Sharma, Shivlal Mewada and Aruna Bilavariya, "Group Rekeying Management Scheme for Mobile Ad-hoc Network", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-05, Page No (5-12), Nov -Dec 2013.
[6]. Pradeep Kumar Sharma, Shivlal Mewada and Pratiksha Nigam, "Investigation Based Performance of Black and Gray Hole Attack in Mobile Ad-Hoc Network", ISROSET-International Journal of Scientific Research in Network Security and Communication, Volume-01, Issue-04, Page No (8-11), Sep -Oct 2013
[7]. Tamilarasan, Santhamurthy. "A Quantitative Study and Comparison of AODV, OLSR and TORA Routing Protocols in MANET." International Journal of Computer Science Issues(IJCSI) 9, no. 1 (2012).
[8]. Khiavi, Mina Vajed, Shahram Jamali, and Sajjad Jahanbakhsh Gudakahriz. "Performance Comparison of AODV, DSDV, DSR and TORA Routing Protocols in MANETs." International Research Journal of Applied and Basic Sciences 3, no. 7 (2012): 1429-1436.
[9]. Bakht, Humayun. "Survey of routing protocols for mobile ad-hoc network."International Journal of Information and Communication Technology Research1, no. 6 (2011).
[10]. Nyirenda, Bained, and Jason Mwanza. "Performance Evaluation of Routing Protocols in Mobile Ad hoc Networks (MANETs)." Blekinge Institute of Technology� in January (2009).
[11]. Parvez, Md Masud, Shohana Chowdhury, SM Bulbul Ahammed, AKM Fazlul Haque, and Mohammed Nadir Bin Ali. "Improved Comparative Analysis of Mobile Ad-hoc Network." International Journal of Emerging Technology and Advanced Engineering 2, no. 8 (2012): 205-211..
[12]. Thamizhmaran, K., R. Santosh Kumar Mahto, and V. Sanjesh Kumar Tripathi. "Performance Analysis of Secure Routing Protocols in MANET." International Journal of Advanced Research in Computer and Communication Engineering 1, no. 9 (2012).
Citation
N. Mannan, S. Khurana, "Comparative Analysis of Reactive Protocols in Mobile Ad-Hoc Networks," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.233-237, 2014.
Hypotheses Verification for High Precision Cohesion Metric
Research Paper | Journal Paper
Vol.2 , Issue.4 , pp.238-243, Apr-2014
Abstract
Metrics have been used to measure many attributes of software. For object oriented software, cohesion indicates the level of binding of the class elements. A class with high cohesion is one of the desirable properties of a good object oriented design. A highly cohesive class is less prone to faults and is easy to develop and maintain. Several object oriented cohesion metrics have been proposed in the literature. In this paper, we propose a new cohesion metric, the High Precision Cohesion Metric (HPCM) to overcome the limitations of the existing cohesion metrics. We also propose seven hypotheses to investigate the relationship between HPCM and other object oriented metrics. The hypotheses are verified with data collected from 500 classes across twelve open source Java projects. We have used Pearson�s coefficient to analyze the correlation between HPCM and the metrics in the hypotheses. To further bolster our results we have included p-value to confirm the statistical significance of the findings.
Key-Words / Index Term
Object Oriented Metrics; Cohesion; High Precision
References
[1] G. Concas, M. Marchest, G. Destefanis and R. Tonelli, An empirical study of software metrics for assessing the phases of an agile product, International Journal of Software Engineering and Knowledge Engineering, June 2012, vol. 22, no. 04, pp. 525-548
[2] E. Paikari, M. M. Ritcher and G. Ruhe, Defect Prevention using case based reasoning: An attribute weighing technique based upon sensitivity analysis in neural networks, International Journal of Software Engineering and Knowledge Engineering, Sep. 2012, vol. 22, no. 06, pp. 747-768
[3] M. Khoshgoftaar, K. Gao and A. Napolitano, An empirical study of feature ranking techniques for software quality prediction, International Journal of Software Engineering and Knowledge Engineering, Mar. 2012, vol. 22, no. 02, pp. 161-183
[4] C. Z. Zhou and Y. B. Xu, A novel approach to measuring class cohesion based on dependence analysis, Proceedings of the International Conference on Software Maintenance, 2002, pp. 377-384.
[5] L. C. Briand, C. Bunse and C. J. Daly, A controlled experiment for evaluating quality guidelines on the maintainability of object-oriented designs, IEEE Transactions on Software Engineering, 2001, pp. 513-530.
[6] J. Bieman and L. Ott, Measuring functional cohesion, IEEE Transactions on Software Engineering, 1994, pp. 644-657.
[7] T. Mens and S. Demeyer, Future trends in software evolution metrics, Proceedings of IWPSE2001, ACM, 2002, pp. 83-86.
[8] S. R. Chidamber and C. F. Kemerer, Towards a metrics suite for object-oriented design, Proceedings of Conference on Object-Oriented Programming Systems, Languages and Applications, 1991, pp. 476-493.
[9] S. R. Chidamber and C. F. Kemerer, A metrics suite for object-oriented design, IEEE Transactions on Software Engineering, 1994, pp. 476-493.
[10] W. Li and S. Henry, Object-oriented metrics that predict maintainability, Journal of Systems and Software, 1993, pp. 111-122.
[11] M. Hitz and B. Montazeri, Chidamber and Kemerer metric suite - a measurement theory perspective, IEEE Transactions on Software Engineering, 1996, pp. 267-271.
[12] B. S. Henderson, Object-oriented Metrics: Measure of Complexity. New Jersey, Prentice Hall, 1996, pp. 142-147.
[13] M. Hitz and B. Montazeri, Measuring coupling and cohesion in object oriented systems, Proceedings of the Int. Symposium on Applied Corporate Computing, 1995, 25-27.
[14] M. M. Bieman, B. K. Kang and W. Melo, Cohesion and reuse in an object oriented system, Proceedings of the symposium on software reliability, 1995, pp. 259-262.
[15] L. Badri and M. Badri, A Proposal of a new class cohesion criterion, an empirical study, Journal of Object Technology, 2004
[16] C. Bonja and E. Kidanmariam, Metrics for class cohesion and similarity between methods, Proceedings of the 44th Annual ACM Southeast Regional Conference, 2006, pp. 91-95.
[17] L. Fernandez and R. Pena, A sensitive metric of class cohesion, International Journal of Information Theories and Applications, 2006, pp. 82-91.
[18] J. Bansiya, L. Etzkorn, C. Davis and W. Li, A class cohesion metric for object-oriented designs, Journal of Object Oriented Program, 1999, pp. 47-52.
[19] S. Counsell, S. Swift and J. Crampton, The interpretation and utility of three cohesion metrics for object-oriented design, ACM Transactions on Software Engineering and Methodology, 2006, pp. 15:123-149.
[20] A. J. Dallal and L. Briand, A Precise method-method interaction based cohesion metric for object oriented classes, Simula Research Laboratory, Simula Technical Report, 2009
[21] L. C. Briand, J. Daly, J. Wuest, A unified framework for cohesion measurement in object-oriented systems, Empirical Software Engineering, An International Journal, 1999, pp. 65-117
[22] K. E. Emam, The confounding effect of class size on the validity of object oriented metrics, IEEE Transactions on Software Engineering, 2001, pp. 630-650
[23] Sonar Bug Repository (2012) http://nemo.sonarsource.org, September
[24] N. Kayarvizhy and S. Kanmani, An Automated Tool for Computing Object Oriented Metrics using XML. Proceedings of International Conference on Advances in Computing and Communication ACC2011, Springer, 2011, pp. 69-79.
[25] The Apache Mahout project, http://mahout.apache.org.
[26] The Apache OpenWebBeans project, http://openwebbeans.apache.org.
[27] The Apache Sling project, http://sling.apache.org.
[28] The Apache Synapse project, http://synapse.apache.org.
[29] The Apache Tobago project, http://myfaces.apache.org/tobago/index.html.
[30] The Apache Tomcat project, http://tomcat.apache.org.
[31] The Apache Camel project, http://camel.apache.org.
[32] The Castor project, http://www.castor.org.
[33] The Apache Cayene project, http://cayenne.apache.org.
[34] The Eclipse project, http://www.eclipse.org.
[35] The JDK7 project, http://jdk7.java.net.
[36] The Apache Struts project, http://struts.apache.org.
[37] Basili, Victor R., Lionel C. Briand, and Walc�lio L. Melo, A validation of object-oriented design metrics as quality indicators. IEEE Transactions on Software Engineering, 1996, pp. 751-761.
[38] Subramanyam, Ramanath, and Mayuram S. Krishnan, Empirical analysis of ck metrics for object-oriented design complexity: Implications for software defects. IEEE Transactions on Software Engineering, 2003, pp. 297-310.
Citation
Kayarvizhy N., Kanmani S., Rhymend U.V., "Hypotheses Verification for High Precision Cohesion Metric," International Journal of Computer Sciences and Engineering, Vol.2, Issue.4, pp.238-243, 2014.