IOSR Journal of Computer Engineering (IOSR-JCE)

Sep - Oct 2018 Volume 20 - Issue 5

Version 1 Version 2 Version 3 Version 4

Paper Type : Research Paper
Title : Proposal of a Suitable Identity Management System in Internet of Things for M2M Correspondence
Country : India
Authors : Prof.Dr.G.Manoj Someswar || M.Malla Reddy
: 10.9790/0661-2005010114     logo

Abstract: In the present day situation, individuals are on a typical stage in that they should be associated with the Internet to anyplace and at whenever throught the world. This can be incredibly ascribed to advancement of Information correspondence innovations (ICT) with developing select administrations (shrewd homes, telemedicine, e-Health applications and so forth.) which are accessible for the clients through heterogeneous Internet of Things (IoT) systems, driven by machine to machine (M2M) correspondence. Disregarding the correspondence that is set up essentially by utilizing gadgets, the human clients are genuine "generators" and "customers..........

 

Keywords–Radio Frequency Identification (RFID), Electronic Product Code (EPC), Close Filed Communication (NFC), The Trust Communication Module (TCM), Representational State Transfer (REST)

[1]. ―The internet of things‖ [Online]. Available: http://www.iot-i.eu/iot/public/news/resources/TheThingsintheInternetofThings_SH.pdf. [Accessed: 31-Mar-2015].
[2]. Jeroen van den Hoven, ―Fact sheet- Ethics Subgroup IoT - Version 4.0.‖ [Online]. Available: http://www.ethicsinside.eu/contact. [Accessed: 31-Mar-2015].
[3]. M. V. Moreno, J. L. H. Ramos, and A. F. Skarmeta, ―User role in IoT-based systems,‖ 2014 IEEE World Forum on Internet of Things (WF-IoT), pp. 141–146.
[4]. ―Internet of People: Technology 2015-2025: IDTechEx.‖ [Online]. Available:
[5]. http://www.idtechex.com/research/reports/internet-of-people-technology-2015-2025-000388.asp. [Accessed: 31-Mar-2015]..


Paper Type : Research Paper
Title : Log Based Intrusion Detection System
Country : India
Authors : Umesh K. Raut
: 10.9790/0661-2005011522     logo

Abstract: The idea of making everything readily available and universally has led to a revolution in the field of networks. In spite of the tremendous growth of technologies in the field of networks and information, we still lack in preventing our resources from cyber-attacks. This may not concern small organizations but it is a serious issue as far as industries, companies or national securities are concerned. Since many different mechanisms were opted by organizations in the form of intrusion detection and prevention systems to protect themselves from these kinds of attacks, there are many security breaches which go undetected. A host-based intrusion detection system (HIDS) is a system that monitors a computer system on which it is installed to detect an intrusion and/or misuse, and responds by logging the activity and notifying the designated authority. In this paper, we develop a HIDS using logs generated by services running on the systems. We will discuss about the client-server architecture used in HIDS.

 

Keywords–Terms: IDS, HIDS, security, threat detection, log analysis

[1]. Piyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi and Tim Finin, "Semantic Interpretation of Structured Log Files", 2016 IEEE 17th International Conference on Information Reuse and Integration.
[2]. K. Kent and M. Souppaya, "Guide to computer security log management recommendations of the national institute of standards and technology" NIST, 2006.
[3]. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cyber-security related linked data from text" in Seventh International Conference on Semantic Computing (ICSC). IEEE, 2013,pp. 252259.
[4]. C. H. do Nascimento, R. E. Assad, B. F. Loscio, and S. R. L. Meira, "Ontology: A security log analyses tool using web semantic and ontology," in 2nd OWASP Ibero-American Web Applications Security Conference, 2010, pp. 112.
[5]. Sreenivas Sremath Tirumala, Hira Sathu, Abdolhossein Sarrafzadeh, "Free and open source Intrusion Detection Systems: A study", Interna-tional Conference on Machine Learning and Cybernetics, Guangzhou, 12-15 July 2015..


Paper Type : Research Paper
Title : Detection of fuel adulteration through Multivariate Analysis using Python Programming
Country : India
Authors : Vimal Babu U || Nagamani M || Rama Krishna M || Anjaneya Prasad P || Tagore Finny P || Kumar Goud E || Vijay Cyril Y || Saidi Reddy M
: 10.9790/0661-2005012326     logo

Abstract: The hydrocarbon fractions of the gasoline or Diesel can be detected at the in-situ with the application of the Internet of Things and can be accessed through the remote and data can be perceived through the smart phone. This will help in the finding the tailpipe exhaust, pollutants released into the air. The use of cheaper fuels in the transport field is causing more concern with respect to the health hazard. If the exhaust gas elements/composition is detected in advance, the environmental pollution can be contained to the limiting factors. This will help is limit the global warming so also the carcinogenic diseases, the health hazard in a long way. Multivariate Analysis (MVA) is one of the statistical principles of multivariate statistics, it refers to any statistical technique used to analyze data that arises from more than one variable, which involves observation and analysis of data...........

 

Keywords– Transport Fuels, Adulteration, Computational Techniques, Internet of Things, Multivariate Analysis, Principal component analysis, pandas, Machine learning.

[1]. Iftak Hussain, Munmun Das, Kamal Uddin Ahmad, Pabitra Nath, Water salinity detection using a smartphone (2017), Sensors and Actuators B 239 (2017) 1042-1050, Sensors and Actuators B: Chemical
[2]. Helga G. Aleme, Let¡cia M. Costa, Paulo J.S. Barbeira, (2009), Determination of ethanol and specific gravity in gasoline by distillation curves and multivariate analysis, Talanta 78 (2009) 1422-1428,
[3]. Mohammadreza Khanmohammadi, Amir Bagheri Garmarudi, Miguel de la Guardia, (2012) Characterization of petroleum-based products by infrared spectroscopy and chemometrics, Trends in Analytical Chemistry, Vol. 35, 2012.
[4]. Helga G. Aleme, Let¡cia M. Costa, Paulo J.S. Barbeira, (2008) Fuel Determination of gasoline origin by distillation curves and multivariate analysis, Fuel 87 (2008) 3664-3668.
[5]. A Little Book of Python for Multivariate Analysis by Yiannis Gatsoulis is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. little-book-of-r-for-multivariate-analysis.readthedocs.org Based on a work at A Little Book of R for Multivariate Analysis by Avril Coghlan licensed under CC-BY-3.0.


Paper Type : Research Paper
Title : Texture Classification Based On Variants of Fundamental Units of LBP Using Complete Text on Indexes
Country : India
Authors : Y.Sowjanya Kumari || V. Vijaya Kumar || Ch. Satyanarayana
: 10.9790/0661-2005012737     logo

Abstract: This paper presents a novel approach for texture classification, generalizing the well-known local binary pattern (LBP) approach. The local binary pattern (LBP) descriptor is widely used in texture analysis because of its computational simplicity and robustness to illumination changes. However, LBP has limitations to fully capture discriminating information. The uniform patterns derived on LBP have resulted with a medium classification rate. To overcome this and to make best use of ULBP, this paper proposed extended uniform patterns. In this paper, the variants of fundamental units of texture derived from uniform Local binary patterns are integrated with textons and statistical features are derived on them for a precise texture classification. This paper initially transformed the raw texture...........

 

Keywords– Uniform patterns, texton, Contrast, classification, texton, contrast

[1]. R.M. Haralick , K. Shanmugam , et al. ,Textural features for image classification, IEEE Trans. Syst. Man Cybern. (6) (1973) 610–621.
[2]. T. Randen , J.H. Husoy , Filtering for texture classification: a comparative study, IEEE Trans. Pattern Anal. Mach. Intell. 21 (4) (1999) 291–310.
[3]. T. Ojala , M. Pietikainen , T. Maenpaa , Multiresolution gray-scale and rotation invariant texture classification with local binary patterns, IEEE Trans. Pattern Anal. Mach. Intell. 24 (7) (2002) 971–987 .
[4]. M. Varma , A. Zisserman , A statistical approach to texture classification from single images, Int. J. Comput. Vis. 62 (1–2) (2005) 61–81 .
[5]. J. Zhang , M. Marszałek , S. Lazebnik , C. Schmid , Local features and kernels for classification of texture and object categories: a comprehensive study, Int. J. Comput. Vis. 73 (2) (2007) 213–238


Paper Type : Research Paper
Title : Comparative Analysis of Path Finding Algorithms
Country : India
Authors : Shabina Banu Mansuri || Shiv kumar
: 10.9790/0661-2005013845     logo

Abstract: Searching is the problem-solving technique in artificial intelligence. There are various search algorithms related to search like Dijkstra, Depth first search, Breadth first search, A*,Hill Climbing, Best first search algorithms and their variants. But most famous algorithms are Dijkstra and A* search algorithms. Dijkstra algorithm is used to solve the path finding problem. Almost all application is using Dijkstra till now. As technology grows, the speed of vehicles also increased like rocket. That is why a scholar as well as Microsoft, Google like companies starts working on A* algorithm because A* performance is better than Dijkstra. At present time, even one second has also weightage for Light motor vehicles because of its very high speed. That is why it is necessary to design and develop tools to analysis the performance of Dijkstra, A* and their variants. According to designed or developed tool IDA* performance is better than Dijkstra and A*.

 

Keywords– Light motor vehicles, Path Finding Problem, Dijkstra, A*, IDA*.

[1]. Fredman, Michael Lawrence; Tarjan, Robert E. (1984). Fibonacci heaps and their uses in improved network optimization algorithms. 25th Annual Symposium on Foundations of Computer Science. IEEE. pp. 338–346. doi: 10.1109/SF CS.1 984.71 5934
[2]. Disha Sharma, Sanjay Kumar Dubey,"Anytime A* Algorithm – An Extension to A* Algorithm", IJSER 2013, ISSN 2229-5518
[3]. Russell, Stuart J.; Norvig, Peter (2002), "3.4 Uninformed search strategies", Artificial Intelligence: A Modern Approach (2nd ed.), Prentice Hall.
[4]. Phaneendhar Reddy Vanam,"Shortest path using A* Algorithm", December 13, 2011
[5]. Harita vamja ,Ayesha shaika et al" comparative analysis of different path finding algorithms to study limitations and progress",IJETAE ,VOLUME 7 ISSUE 9,SEPT. 2017.


Paper Type : Research Paper
Title : The Evaluation of (CapEx/OpEx) Cost reduction of IPTV Service delivery using SDN Solution
Country : India
Authors : Esmeralda Hysenbelliu || Arjan Durresi
: 10.9790/0661-2005014653     logo

Abstract: This paper aims to quantify and evaluate the cost saving of offering IPTV service through the 'Gold' Network Solutions implemented in IPTV SMC ISP data center; SDN and NFV.Recently, the demand for Streaming services like Real-time Video Streaming, IPTV Application service, Video Game,etc. is tremendous increased,and the end-users are pretending to deliver these services with high quality and low Cost. On the other hand, the Service Providers are facing several problems through offering the services, such as a problem with bandwidth, difficulties in Management, Controlling and Monitoring of huge data collected, the problem with Performance and quality of service delivering by the clients.Through SDN capabilities, the IPTV ISP's can benefit to reach cost saving...........

[1]. Smura T. et al., "Virtual operators in the mobile industry: a techno-economic analysis," NETNOMICS: Economic Research and Electronic Networking, vol. 8, no. 1-2, 2007, pp. 25-48
[2]. Harno J. et al., "Alternatives for mobile operators in the competitive 3G and beyond business", Telecommunication Systems, vol. 42, no. 2, 2009, pp. 77-95
[3]. Ofcom, "Application of spectrum liberalization and trading to the mobile sector. A further consultation" Consultation document, http://stakeholders.ofcom.org.uk/consultations/spectrumlib/, 2009
[4]. Das S. et al., "Rethinking IP Core Networks," Journal of Optical Communications and Networking, vol. 5 no.12, 2013, pp. 1431-1442
[5]. Li X. et al., "The Method and tool of cost analysis for cloud computing," Proceedings of the IEEE Conference on Cloud Computing, 2009, pp. 93-100


Paper Type : Research Paper
Title : Nanobiosensors: Ideas And Variations
Country :  
Authors : Dr.Khan Uzma Khatoon
: 10.9790/0661-2005015460     logo

Abstract: Biosensing has been one amongst the most popular topic attracting scientific minds since long back. It's therefore as biological entities square measure terribly complicated and square measure directly related to the existence of a healthy setting. The look of biosensors additionally has witnessed vital changes within the recent past. Biosensors for applications as various as food quality estimation, environmental observance, and identification of clinical and metabolic complications have return to the fore. Technology has given some extremely exciting ingredients for the development of sensing development. the utilization of various nanomaterials starting from nanoparticles, nanotubes........

[1]. V. Dzyadevych, V. N. Arkhypova, A. P. Soldatkin et al., ―Amperometric enzyme biosensors: past, present and future Biocapteurs enzymatiques à transduction ampérométrique: passé, présent, futur,‖ Intermediate-Range Ballistic Missile, vol. 29, pp. 171–180, 2008. View at Publisher · View at Google Scholar
[2]. P. T. Kissinger, ―Biosensors—a perspective,‖ Biosensors and Bioelectronics, vol. 20, no. 12, pp. 2512–2516, 2005. View at Publisher · View at Google Scholar · View at Scopus
[3]. L. Chen, B. Gu, G. Zhu, Y. Wu, S. Liu, and C. Xu, ―Electron transfer properties and electrocatalytic behavior of tyrosinase on ZnO nanorod,‖ Journal of Electroanalytical Chemistry, vol. 617, no. 1, pp. 7–13, 2008. View at Publisher · View at Google Scholar · View at Scopus
[4]. F. Qu, M. Yang, Y. Lu, G. Shen, and R. Yu, ―Amperometric determination of bovine insulin based on synergic action of carbon nanotubes and cobalt hexacyanoferrate nanoparticles stabilized by EDTA,‖ Analytical and Bioanalytical Chemistry, vol. 386, no. 2, pp. 228–234, 2006. View at Publisher · View at Google Scholar · View at Scopus
[5]. P. Van Gerwen, W. Laureyn, W. Laureys et al., ―Nanoscaled interdigitated electrode arrays for biochemical sensors,‖ Sensors and Actuators B, vol. B49, no. 1-2, pp. 73–80, 1998. View at Google Scholar · View at Scopus


Paper Type : Research Paper
Title : A Survey on Machine Learning And Data Mining Methods And Applications
Country : India
Authors : Rajan Singh || Bramah Hazela
: 10.9790/0661-2005016165     logo

Abstract: In This paper we have a tendency to describe a centered literature Survey of machine learning (ML) and data processing (DM) ways and applications .Under this analysis paper explanations of every machine learning and data processing technique square measure providing. It's established on the amount of the importance of a rising technique, Papers representing every technique were recognized, and it's additionally used for scan, and summarized .Because we know that the data are very important in ML & DM methods. As we know that ML&DM is very important and growing research area .it is used by the natural scientist to as well.in this paper we want explain and survey of combining both machine learning and data mining methods.

 

Keywords: Data mining, Machine learning ,Clustering.

[1]. Ayodele, T. O. (2010). Types of machine learning algorithms. In New advances in machine learning. InTech.

[2]. Mitchell, T., Cohen, W., Hruschka, E., Talukdar, P., Yang, B., Betteridge, J. & Krishnamurthy, J. (2018). Never-ending learning. Communications of the ACM, 61(5), 103-115.

[3]. 3Pedregosa, F., Varoquaux, G., Gramfort, A., Michel, V., Thirion, B., Grisel, O., ... & Vanderplas, J. (2011). Scikit-learn: Machine learning in Python. Journal of machine learning research, 12(Oct), 2825-2830.

[4]. Wang, J., Jebara, T., & Chang, S. F. (2013). Semi-supervised learning using greedy max-cut. Journal of Machine Learning Research, 14(Mar), 771-800.

[5]. Chapelle, O., Sindhwani, V., & Keerthi, S. S. (2008). Optimization techniques for semi-supervised support vector machines. Journal of Machine Learning Research, 9(Feb), 203-233. pp. 93-100


Paper Type : Research Paper
Title : DDOS Anomaly Detection And Mitigation In Software Defined Networking (SDN)
Country : China
Authors : Abdul-Wadud Alhassan || Adebayo B. Salaudeen
: 10.9790/0661-2005016672     logo

Abstract: The introduction of Software Defined Networking as a panacea to the global demand for a more secure and highly dependable internet infrastructure has also brought along security issues. The adoption of OpenFlow Protocol (OFP) by SDN as the way of communication between controllers and switches has not only brought about easy and direct manipulation of data for enhanced packet forwarding policies, but also renders the network vulnerable to security issues (DDOS attacks) since the OF switch has to ask the controller to install new rules for any new incoming packet. In this paper, we prove that SDN is capable of handling security threats that arise from the above vulnerability. We implement a DDOS detection module that detects and blocks SYN flood attacks aimed to destabilize the flow of normal network traffic among users in a software-defined networking environment..

 

Keywords: DDOS detection , Mininet, OpenFlow, Software Defined Networking, Security, SYN flooding

[1]. Open Networking Foundation. Software-Defined Networking: The New Norm for Networks. White paper, Open Networking Foundation, Palo Alto, CA, USA, 2012.
[2]. D. Kreutz, F. M., V. Ramos, P. Verissimo, C. E. Rothenberg, S. Azodolmolky and S. Uhlig, "Software-Defined Networking: A Comprehensive Survey," Proceedings of the IEEE, 2014, vol. 103, no. 1, pp. 14-76.
[3]. Openflow Switch Specification. Version 1.1.0 Implemented (Wire Protocol 0x02), 2011.
[4]. R. Mohammadi, R. Javidan, and M. Conti. SLICOTS: An SDN-Based Lightweight Countermeasure for TCP SYN Flooding Attacks. IEEE transactions on Network and Service Management, 2017, vol. 14, no. 2, pp 487-497.
[5]. L. Schehlmann, S. Abt and H. Baier: Blessing or Curse? Revisiting Security Aspects of Software-Defined Networking. IEEE 10th international conference on Network and Service Management. 2014


Researcher can also search IOSR published article contents through

IOSR Xplore