Version-2 (Nov-Dec 2018)
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Abstract: Regarding the security of computer systems, the intrusion detection systems (IDS) are essential components for the detection of attacks at the early stage. Therefore, the main goal of this thesis is to choose the differentiating features the development of an optimal machine learning algorithm with respect to high detection rates, fast training and testing processes. So a proposed machine learning model containing a feature selection algorithm (wrapper type) based on the integration of Firefly algorithm (FA) with Naïve Bayesian Classifier (NBC) were proposed. 1999 KDDCUP and NSL- KDD data sets . The proposed model been developed and tested over two types of feature selection objectives single objective fitness function (accuracy) and.........
Keyword: Security , Intrusion detection systems, Training , Testing , Feature selection algorithm , Firefly algorithm , Naïve Bayesian Classifier , Accuracy.
[1]. KDD Cup 1999 Dataset, (n.d.).
[2]. M. Tavallaee, E. Bagheri, W. Lu, A.A. Ghorbani, A detailed analysis of the KDD CUP 99 data set, in: IEEE Symp. Comput. Intell. Secur. Def. Appl. CISDA 2009, 2009. doi:10.1109/CISDA.2009.5356528.
[3]. S.R. Hasani, Z.A. Othman, S.M.M. Kahaki, Hybrid feature selection algorithm for intrusion detection system, J. Comput. Sci. 10 (2014) 1015–1025. doi:10.3844/jcssp.2014.1015-1025.
[4]. S. Srinoy, Intrusion Detection Model Based On Particle Swarm Optimization and Support Vector Machine, in: Proc. 2007 IEEE Symp. Comput. Intell. Secur. Def. Appl., 2007. doi:1-4244-0700-1/07/$20.00.
[5]. S. Mukherjee, N. Sharma, Intrusion Detection using Naive Bayes Classifier with Feature Reduction, Procedia Technol. 4 (2012) 119–128. doi:10.1016/j.protcy.2012.05.017..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Simulating ECA-AODV Routing Scheme using TCP for MANETs |
Country | : | India |
Authors | : | Raghavendra M || Pallapa Venkataram |
: | 10.9790/0661-2006020818 |
Abstract: ECA model checks different resource constraints before constructing the path. This will ensure long time connectivity between source and destination nodes. TCP model will provide reliable data transfer between source node and destination node, which ensures no data loss and error free. In the current work, end to end ACK scheme is implemented, which will overcome reliability and error issues. In our previous work, the data transfer starts from one of the source, which does not have facility to confirm whether all the information sent is reached to the destination node or not, without any data loss and error free. In the current proposed model, end to end ACK scheme is implemented which will overcome above deficiency. When ECA model is combined with QoS parameters in AODV routing.........
Keywords–adhoc routing, adhoc wireless networks, Quality of Service (QoS), Event Condition Action (ECA) , ECA Simulation
[1] Raghavendra M and Pallapa Venkataram, "ECA Model Based QoS AODV Routing for MANETs",International Journal of Computer Networks Communications (IJCNC) Vol.9, No.3, May 2017DOI: 10.5121/i- jcnc.2017.9308http://aircconline.com/ijcnc/V9N3/9317cnc08.pdf
[2] Chavan, Chandrashekhar Pomu and Pallapa Venkataram. "Designing a Routing Protocol for Ubiquitous Networks Using ECA Scheme.", CoRR abs/1507.07662 (2015)
[3] Amin, Noorul, and Abdelmuttlib Ibrahim. "ECAODV: Enhanced Classified Ad-Hoc on Demand Distance Vector Routing Protocol." In International Multi Topic Conference, pp. 92-100. Springer Berlin Heidelberg, 2012.
[4] J. Heo and W. Kim, "Ad-hoc routing Protocol-based Ubiquitous Network System In the Hospital Environment," 2006 7th International Symposium on Antennas, Propagation & EM Theory, Guilin, 2006, pp. 1-4. doi: 10.1109/IS-
APE.2006.353291
[5] Kumar, Rakesh, Anil K. Sarje, and Manoj Misra. "An AODV based QoS routing protocol for delay sensitive appli- cations in mobile Ad Hoc networks." Journal of Digital Information Management 8.5 (2010): 303-314..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Two simples proofs of Fermat 's last theorem and Beal conjecture |
Country | : | France |
Authors | : | M. Sghiar |
: | 10.9790/0661-2006021820 |
Abstract:If after 374 years the famous theorem of Fermat-Wiles was demonstrated in 150 pages by A. Wiles [2], the puspose of this article is to give a simple demonstration and deduce a proof of the Beal conjecture. Résumé : Si après 374 ans le célèbre théorème de Fermat-Wiles a été démontré en 150 pages par A. Wiles [2], le but de cet article est de donner une simple démonstration et d'en déduire une preuve de la conjecture de Beal..
Keywords–Fermat, Fermat-Wiles theorem, Fermat's great theorem.
[1]. https://en.wikipedia.org/wiki/Beal conjecture
[2]. https://en.wikipedia.org/wiki/Fermat last theorem
[3]. M. Mghiar , la preuve de la conjecture abc, iosr journal of mathematics (iosr-jm), e-issn: 2278-5728, p-issn: 2319-765x. volume 14,
issue 4 ver. i (jul - aug 2018), pp 22-26.
[4]. Andrew Wiles, Modular elliptic curves and Fermat's last Theorem, Annal of mathematics, volume 10,142, pages 443-551, septemberdecember,
1995.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Classification Algorithms for Predicting Computer Science Students Study Duration |
Country | : | Indonesia |
Authors | : | Debby Erce Sondakh |
: | 10.9790/0661-2006022126 |
Abstract: The Department of Computer Science Universitas Klabat offers a bachelor program in Computer Science which should be completed within eight semesters or four years. Some students can accomplish the course in less than four years; however, others had to spend more than the specified period. This study examined students' performance (grades) in the first two semesters. The aim is to develop prediction models for duration study of computer science students. Classification techniques from the Data mining field were applied to develop the models. Three algorithms were selected: Naïve Bayes, decision tree and Support Vector Machine. The Courses, Gender, and Grades (major-grades, basic-grades, and general-grades) are the independent parameters that would predict the dependent variable, i.e. study duration. The resulting models showed that the three algorithms could develop a pretty good study duration prediction models. Decision tree and SVM performance in predicting the instances in Greater categories is better than NB. On the other hand, NB is superior in predicting instances in the Equal category. Nevertheless, the three algorithms suffered in predicting instances in Less category importance.
Keywords–Predictive Model, Study Duration, Classification
[1]. J. Han & M. Kamber, Data Mining Concepts and Techniques, 2nd Ed., (USA: Morgan Kauffman Publisher, 2006).
[2]. K. J. Cios, et.al., Data Mining A Knowledge Discovery Approach, (New York: Springer, 2007).
[3]. B. K. Baradwaj dan S. Pal, Mining Educational Data to Analyze Students' Performance, International Journal of Advanced Computer Science and Applications, 2(6), 2011, 63-39.
[4]. M. Durairaj dan C. Vijitha, Educational Data Mining for Prediction of Student Performance Using Clustering Algorithms, International Journal of Computer Science and Information Technologies, 5(4), 2014, 5987-5991.
[5]. Aziz, N. H. Ismail, dan F. Ahmad, First Semester Computer Science Students' Academic Performances Analysis by Using Data Mining Classification Algorithms, Proc. of the International Conference on Artificial Intelligence and Computer Science (AICS 2014), Bandung, Indonesia, 2014. 100-109...
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Detecting contiguous regions having traffic problems using taxi trajectories |
Country | : | Indonesia |
Authors | : | Ngoc B. Do || Chi Q. Nguyen |
: | 10.9790/0661-2006022734 |
Abstract: Nowadays, taxi is one of the most popular transportation modes. There is a large amount of passenger using taxi everyday and taxi trajectories represent the mobility of people. In the big cities, taxi is equipped GPS device and run during 24 hours per day, they may be used to extract reliable information for transportation status. This paper states our method using taxi trajectories in Hanoi, Vietnam during 4 weeks from September 18th to October 15th. In our method, Hanoi map is divided into the smaller regions with a predefined size. We identify the contiguous regions where jams happen during different time slots and their correlations.
[1]. Rakesh Agrawal, Ramakrishnan Srikant, "Fast Algorithms for Mining Association Rules in Large Databases", VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases, California, United States on June, (1994)
[2]. Stephan Börzsönyi, Donal Kossmann, Konrad Stocker, The skyline operator, Proceedings of the 17th International Conference on Data Engineering, Washington, United States on April 02 – 06, (2001)
[3]. Jonathan J. Buonocore, Harrison J. Lee, Jonathan I. Levy, The Influence of Traffic on Air Quality in an Urban Neighborhood: A Community–University Partnership, Am J Public Health, Volume 99, pp 629-635 (2009)
[4]. Luchao Cao, Latita Thakali, Liping Fu, Garrett Donaher, Effect of Weather and Road Surface Conditions on Traffic Speed of Rural Highways, Annual Meeting of the Transportation Research Board, Washington, United States on January 13-17, (2013)
[5]. Jochen Hipp, Ulrich Güntzer, Gholamreza Nakhaeizadeh, Algorithms for association rule mining - a general survey and comparison, ACM SIGKDD Explorations Newsletter, Volume 2 Issue 1, pp 58-64 (2000)
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The internet plays vital role in the current digital era. The growth of the internet makes more advancement in all the fields including virtual medical treatment, online medical prescription and even online medical supply. But the security needs more strong environments especially for medical data processing. Cuckoo Search Algorithm (CSA) provides feasible support to identify the powerful key for the purpose of encryption and decryption. In particular, online medical prescription is in the form of text data. Hence, Advanced Encryption Standard (AES) algorithm will provide more security rather than other algorithms. The cloud simulator is used to check efficiencies of encryption and decryption time. Different text files with varying sizes are used for performance comparison.
Keywords– Advanced Encryption Standard, Cuckoo Search Algorithm, Decryption, Encryption, Medical Data.
[1] Fadia Shah, Jiaping Li, Raheel Ahmed Memon, Faiza Shah, Yasis Shah, Broad Big Data Domain via Medical Big Data, Proc. IEEE 14th International Computer Conference on Wavelet Active Media Technology and Information Processing, China, 2017, 327-331.
[2] Wang Xinyan, Tian Liyuan, Wu Wenjum, MOOC for Medical Big Data Research, Proc. IEEE First International Conference on Big Data Computing Service and Applications, California, 2015, 452-455.
[3] Arnab Rahman Chowdhury, Junayed Mahmud, Abu Raihan Mostofa Kamal, MAES: Modified Advanced Encryption Standard for Resource Constraint Environments, Proc. IEEE Sensors Application Symposium (SAS), South Korea, 2018, 140-146.
[4] Yang Xiaodong, Cai Zefan, Particle Swarm Optimization and Cuckoo Search Paralleled Algorithm, Proc. 3rd IEEE International Conference on Computer and Communications, China, 2017, 2236-2240.
[5] Amal Joshy, K X Amitha Baby, S Padma, K A Fasila, Text to image encryption technique using RGB substitution and AES, Proc. IEEE International Conference on Inventive Computing and Informatics (ICICI), 121-125, 2018.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The project entitled as Brute Force Attack On Open Functionality Secured is to design and develop the application package for well secured dynamic application. A common threat web developer's face is a password-guessing attack known as a brute force attack. A brute-force attack is an attempt to discover a password by systematically trying every possible combination of letters, numbers, and symbols until you discover the one correct combination that works. In the world of Cyber crimes, brute force attack is an activity which involves repetitive successive attempts of trying various password combinations to break into any website. This attempt is carried out vigorously by the hackers who also make use of bots they have installed maliciously in other computers to boost the computing power required to run such type of attacks. Usually, every common ID (for e.g. ―admin‖) has a password.
[1]. Adleman, Leonard M.; Rothemund, Paul W.K.; Roweis, Sam; Winfree, Erik (June 10–12, 1996). On Applying Molecular Computation To The Data Encryption Standard. Proceedings of the Second Annual Meeting on DNA Based Computers. Princeton University.
[2]. Cracking DES – Secrets of Encryption Research, Wiretap Politics & Chip Design. Electronic Frontier Foundation. ISBN 1-56592-520-3.
[3]. Burnett, Mark; Foster, James C. (2004). Hacking the Code: ASP.NET Web Application Security. Syngress. ISBN 1-932266-65-8.
[4]. Diffie, W.; Hellman, M.E. (1977). "Exhaustive Cryptanalysis of the NBS Data Encryption Standard". Computer. 10: 74–84. doi:10.1109/c-m.1977.217750.
[5]. Graham, Robert David (22 June 2011). "Password cracking, mining, and GPUs". erratasec.com. Retrieved 17 August 2011.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Performance testing is based on the assertion that language and culture study are best brought together when the teacher is effective in the affective as well as cognitive and skills domains, teaching strategies and activities are presented that combine specific teaching techniques and ideas with other human and cultural resources in and out of the classroom. Chapters discuss: when and in what language culture should be taught; what "culture" refers to and its connection with language; approaches to understanding how societies evolve different ways to satisfy their needs; seven goals of cultural instruction; performance objectives for each of the seven goals; developing effective learning activities..............
[1]. M. Abdalla and L. Reyzin. A new forward-secure digital signature scheme. Asiacrypt'00, LNCS vol. 1976, pp. 116–129, Springer-Verlag, 2000.
[2]. R. Anderson. Two remarks on public key cryptology. Invited Lecture, ACM-CCS'97.
[3]. D. Beaver and S. Haber. Cryptographic protocols provably secure against dynamic adversaries. In Eurocrypt' 92, LNCS vol. 658, pp. 307–323, Springer-Verlag, 1992.
[4]. D. Beaver, Plug and play encryption, Advances in Cryptology — Crypto' 97, LNCS vol. 1294, pp. 75–89, Springer-Verlag, 1997.
[5]. M. Bellare and S. K. Miner. A forward-secure digital signature scheme. Advances in Cryptology — Crypto' 99, LNCS vol. 1666, pp. 431–448, Springer-Verlag, 1999 1.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such variant is aggregate signature scheme, which allows aggregation of different signatures by different users on different messages, to achieve computational and communication efficiency. Such schemes are useful in the design of Wireless Sensor Networks (WSN), Mobile Ad-hoc Networks (MANETS), and Vehicular Ad-hoc Networks (VANETS); where storage, bandwidth and computational complexity are major constraints. Recently, in 2017, B. Kang et al. proposed.........
[1] W. Diffie, and M.E. Hellman, "New Directions in Cryptography", IEEE Transactions in Information Theory, Vol. 22, pp. 644-654, 1976.
[2] A. Shamir, "Identity-based Cryptosystems and Signature Schemes", In: Proc. of Advances in Cryptology, Crypto-1984, Santa Barbara, CA, USA, Vol.196, pp. 47-53, 1984.
[3] S. S. Al-Riyami, and K. G. Paterson, "Certificateless Public key Cryptography", In: Proc. of Advances in Cryptology, Asiacrypt-2003, Taipei, Taiwan, Vol. 2894, pp. 452-473, 2003.
[4] D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps", In: Proc. of Advances in Cryptology, Eurocrypt-2003, Warsaw, Poland, pp.416-432, 2003.
[5] B. Kang, M. Wang, and D. Jing, "An Efficient Certificateless Aggregate Signature Scheme", Wuhan University Journal of Natural Sciences, Vol. 22, No. 2, pp. 165-170, 2017.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Speech is most prominent & primary mode of Communication among human being. Past after years of research and development & the accuracy of automatic speech recognition remains the important challenges in research. The design of Speech Recognition system require careful attentions the following issues: Definition of various types of speech classes, speech representation, feature extraction techniques, speech classifier, and database and performance evaluation. The problems are existing in ASR and the various techniques to solve these problems constructed by various research work have been presented in a chronological order. The objective of this research paper is to summarize and compare some of the well-known methods used in various stages of speech recognition.
[1]. Hammarström, Harald; Forkel, Robert; Haspelmath, Martin, eds. (2017). "Pali". Glottolog 3.0. Jena, Germany: Max Planck Institute for the Science of Human History.
[2]. Hazra, Kanai Lal. Pāli Language and Literature; a systematic survey and historical study.D.K. Printworld Lrd. New Delhi, 1994.
[3]. Shipra Gupta, Application of MFCC in Text Independent Speaker Recognition, IJARCSSE, ISSN: 2277 128X, Volume 6, Issue 5, May 2016.
[4]. Mridula Shanbhogue, Shreya Kulkarni, R Suprith, Tejas K I, Nagarathna N, A Study on Speech Recognition, IJRASET, ISSN: 2321-9653, Volume 4 Issue III, March 2016.
[5]. Doda, Er Shweta, and Er Rajni Mehta. "Speech Recognition Techniques: A Review." JCD Vidyapeeth, Sirsa, India 4, no. 8 (2014).
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Today's application are based on the network as the main communication mediums for interconnecting between its peers. From this term, the importance of the network increased rapidly as the raise of technology and applications taken place. In this paper, we produce a theoretical and practical aspects of modern communication networks in term of e administration systems. The e- administration systems have entered in almost every modern governmental and private sectors to serve the conversion from paper systems to the automotive systems. From this point of view, the constructing of this paper is taken the 4G LTE and the WIMAX communication networks under the scope with analytical results for the implementation of the e- administration in both of the networks. As each networks delivered a different performance when running e- administration application, a performance.......
Keywords: LTE , WiMax , 4G , Wireless , E-administration
[1]. Abdulrahman Al-Kandari , Meshal Al-Nasheet , Abdullah R. Abdulgafer . "WiMAX vs. LTE: an Analytic Comparison". 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP).2014.IEEE.
[2]. Geetika Narang, Reena Dadhich, D.M.Yadav . "Survey of Mobile WiMAX and its threats". 2016 International Conference on ICT in Business Industry & Government (ICTBIG).2016.IEEE
[3]. Otilia Popescu1;and Dimitrie C. Popescu . "On the Performance of 4G Mobile Wireless Systems with Multiple Antennas".
[4]. Shyam S. Wagle, Minesh Ade, and M. Ghazanfar Ullah . "Network Transition from WiMAX to LTE". JOURNAL OF COMPUTING.2011
[5]. Rakesh Kumar Singh, Ranjan Singh. "4G LTE Cellular Technology: Network Architecture and Mobile Standards". International Journal of Emerging Research in Management &Technology.2016
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Heart problems are a source of danger to human life, so it is necessary to conduct an ECG to avoid the threat to our lives. The result is recorded in the form of a signal or waves through the technique
of ECG, but faces the problem of artifacts, basic roaming and noise, It should be removed from the original signal. There are many methods used to remove noise in the medical field such as neural retina and wavelet transformation. In this paper we have studied literature on the development of advanced technology and algorithm and performed an analysis of the advantages and disadvantages.
Keywords: ECG, Neural Network, Wavelet transform, Noise, Wander baseline
[1]. Mico Yee Man Wong, "Comparison of Median Filter and Discrete Dyadic Wavelet Transform for Noise Cancellation in Electrocardiogram," Bulletin of Advance Technology Research,vol.4,No. 6, pp. 16-20,Jun. 2010.
[2]. C.B. Mbachu, K.J. Offor, "Reduction of Power Line Noise in ECG Signal using FIR Digital Filter Implemented with Hamming Window," International Journal of Science, Environment and Technology, 22783687, Vol. no. 2, Issue no. 6, 2013.
[3]. Jaykumar S. Kamewar, Millind V. Sarode, "The Combined Effect of Median and FIR Filter in Pre-processing of ECG Signal using MATLAB," IJCA, National Level Technical Conference,X-PLORE 13, pp. 30-33.
[4]. Aung Soe Khaing and Zaw Min Naing "Quantitative Investigation of Digital Filters in Electrocardiogram with Simulated Noises" International Journal of Information and Electronics Engineering, Vol. 1, No. 3, November 2011,pg no-210-216.
[5]. Geeta Kadam, P.C. Bhaskar, "Reduction of Power Line Interference in ECG Signal Using FIR Filter," International Journal of Computational Engineering Research, 2250-3005, Vol. no. 2 , Issue no. 2, Mar-Apr 2012.