archive-org.com » ORG » I » IJORCS.ORG

Total: 231

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Unification of Randomized Anomaly in Deception Detection using Fuzzy Logic under Uncertainty
    V Narayani and Dr S P Victor Unification of Randomized Anomaly in Deception Detection using Fuzzy Logic under Uncertainty International Journal of Research in Computer Science 2 no 2 2012 7 14 doi 10 7815 ijorcs 22 2012 016 Close Abstract In the recent era of computer electronic communication we are currently facing the critical impact of Deception which plays its vital role in the mode of affecting efficient information sharing system Identifying Deception in any mode of communication is a tedious process without using the proper tool for detecting those vulnerabilities This paper deals with the efficient tools of Deception detection in which combined application implementation is our main focus rather than with its individuality We propose a research model which comprises Fuzzy logic Uncertainty and Randomization This paper deals with an experiment which implements the scenario of mixture application with its revealed results We also discuss the combined approach rather than with its individual performance References Cited By Alan Ryan Professional liars Truth Telling Lying and Self Deception Social Research Fall 1996 Bond c F A world of lies the global deception research team JournalofCrossculturePsychology 2006Vol 37 1 60 74 Burgoon J K and Qin T The Dynamic Nature of Deceptive Verbal Communication Journal of Language and Social Psychology 2006 vol25 1 1 22 doi 10 1177 0261927X05284482 Gupta Bina 1995 Perceiving in Advaita Vedanta Epistemological Analysis and Interpretation Delhi Motilal Banarsidass pp 197 ISBN 81 208 1296 4 Pennebaker J W Mehl M R Niederhoffer K Psychological aspects of natural language use our words ourselves Annual Review of Psychology 2003 54 547 577 Steve Woznaik L Simon 2002 The art of deception controlling the human element of security Wiley 1 edition Whissell C Fournier M Pelland R Weir D Makaree K A comparison of Classfiifcation methods for

    Original URL path: http://www.ijorcs.org/manuscript/id/16/srajkumar/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Multiple Linear Regression Models in Outlier Detection
    databases is important both for improving the quality of original data and for reducing the impact of anomalous values in the process of knowledge discovery in databases Such anomalous values give useful information to the data analyst in discovering useful patterns Through isolation these data may be separated and analyzed The analysis of outliers and influential points is an important step of the regression diagnostics In this paper our aim is to detect the points which are very different from the others points They do not seem to belong to a particular population and behave differently If these influential points are to be removed it will lead to a different model Distinction between these points is not always obvious and clear Hence several indicators are used for identifying and analyzing outliers Existing methods of outlier detection are based on manual inspection of graphically represented data In this paper we present a new approach in automating the process of detecting and isolating outliers Impact of anomalous values on the dataset has been established by using two indicators DFFITS and Cook sD The process is based on modeling the human perception of exceptional values by using multiple linear regression analysis References Cited By Hawkins D Identification of Outliers Chapman and and Hall London 1980 Barnett V and Lewis T 1994 Outliers in Statistical Data John Wiley Sons 3rd edition Grubbs F E 1969 Procedures for detecting outlying observations in samples Technometrics 11 1 21 doi 10 1080 00401706 1969 10490657 Rousseeuw P and Leroy A 1996 Robust Regression and Outlier Detection John Wiley Sons 3rd edition Cook R D and Weisberg S T 1982 Residuals and influence in New York Chapman and Hall Abraham B and A Chuang Outlier Detection and Time Series Modelling Technometrics 1989 doi 10 1080 00401706 1989 10488517

    Original URL path: http://www.ijorcs.org/manuscript/id/18/smakhaleelur-rahman/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Adoption of Parallel Genetic Algorithms for the Solution of System of Equations
    require modeling the system as set of simultaneous linear non linear equations and generating solutions to satisfy the system of equations Analytical approach towards solving the system of equations remains practical so long as considerable constraints are imposed on the modeled system to bring in significant simplicity so as to retain the system model within the scope of defined algorithms for solving system of equations The current work adopts the concept of genetic algorithm towards evolving a solution to a system of equations The fundamental strength of genetic algorithms lies in the fact the solution generation is practically unconstrained permitting the methodology to become the superset for all possible realizable problems One of the oft repeated and highlighted drawbacks of genetic algorithm i e requirements of huge initial population and corresponding extended number of computations and hence time is addressed by exploiting multi processing capabilities of the current generation hardware as well as system software Adopted strategy for selecting the best population implementation flow chart along with a case study is presented References Cited By Wang D and Zhiming Z Differential equations with symbolic computation Birkhauser Basel 2005 doi 10 1007 3 7643 7429 2 Versteeg H and Malalasekara W An introduction to computational fluid dynamics The finite volume method Pearson 2008 Smith I M and Griffiths D V Programming the finite element method John Wiley Sons 2004 Hayt W H Kemmerly J E and Durbin S M Engineering Circuits Analysis Tata McGraw Hill Education 2006 Chapra S and Canale R Numerical Methods for Engineers McGraw Hill Higher Education 2009 Hamming R W Numerical methods for scientists and engineers Dover Publications 1973 Sarkar T Siarkiewicz K and Stratton R Survey of numerical methods for solution of large systems of linear equations for electromagnetic field problems IEEE Transactions on Antennas and

    Original URL path: http://www.ijorcs.org/manuscript/id/15/shilpa-s-babalad/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • BIGP- A New Single Protocol that can work as an IGP (Interior Gateway Protocol) as well as EGP (Exterior Gateway Protocol)
    4 2012 13 17 doi 10 7815 ijorcs 24 2012 034 Close Abstract EGP and IGP are the key components of the present internet infrastructure Routers in a domain forward IP packet within and between domains Each domain uses an intra domain routing protocol known as Interior Gateway Protocol IGP like IS IS OSPF RIP etc to populate the routing tables of its routers Routing information must also be exchanged between domains to ensure that a host in one domain can reach another host in remote domain This role is performed by inter domain routing protocol called Exterior Gateway Protocol EGP Basically EGP used these days is Border Gateway Protocol BGP Basic difference between the both is that BGP has smaller convergence as compared to the IGP s And IGP s on the other hand have lesser scalability as compared to the BGP So in this paper a proposal to create a new protocol is given which can act as an IGP when we consider inter domain transfer of traffic and acts as BGP when we consider intra domain transfer of traffic References Cited By Border Gateway Protocol Internetworking technology overview June 1999 XU Ke Wang An ping WU Jian ping and WANG Bin Research on Routing Policy and Routing Information Propagation of Boarder Gateway Protocol Version 4 BGP 4 Proceedings of IEEE TENCON 02 Selin Cerav Erbas Olivier Delcourt Bernard Fortz and Bruno Quoitin The Interaction of IGP Weight Optimization with BGP IEEE conference 2007 Martin O Nicholes and Biswanath Mukherjee A Survey of Security Techniques for the Border Gateway Protocol BGP IEEE communications surveys tutorials vol 11 no 1 first quarter 2009 doi 10 1109 SURV 2009 090105 Masafumi Watari Yuichiro Hei Shigehiro Ano and Katsuyuki Yamazaki OSPF based Fast Reroute for BGP Link Failures IEEE GLOBECOM 2009 proceedings doi 10 1109 GLOCOM 2009 5425488 Jesús Expósito Valentina Trujillo and Eric Gamess Easy EIGRP A Didactic Application for Teaching and Learning of the Enhanced Interior Gateway Routing Protocol 2010 Sixth International Conference on Networking and Services doi 10 1109 ICNS 2010 53 Dahai Xu Optimal traffic engineering via newton s method 2008 IEEE conference doi 10 1109 ICNS 2010 53 Conor Creagh and Cormac Sreenan An Interior Path Vector Routing Protocol 2006 IEEE doi 10 1109 LCN 2006 322096 Hongjun Wang Wanping Hao and Xin Zhao A Method to Eliminate BGP Divergence Based on AS Relationships 2010 Second Pacific Asia Conference on Circuits Communications and System PACCS doi 10 1109 PACCS 2010 5627907 Steve Uhlig and Bruno Quoitin Tweak it BGP based Interdomain Traffic Engineering for transit Ass 2005 IEEE doi 10 1109 NGI 2005 1431650 Anja Feldmann Lixin Gao and Timothy Griffin Z Morley Mao Inter domain Routing and the Border Gateway Protocol IEEE Network November December 2005 Sharad Agarwal Antonio Nucci and Supratik Bhattacharyya Measuring the Shared Fate of IGP Engineering and Interdomain Traffic Proceedings of the 13th IEEE International Conference on Network Protocols ICNP 05 Hongwei Zhang Anish Arora and Zhijun Liu A Stability oriented

    Original URL path: http://www.ijorcs.org/manuscript/id/34/isha-gupta/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • A Robust Cryptographic System using Neighborhood-Generated Keys
    Ali Shazia Yasin Secure E commerce Protocol International Journal of Computer Science and Security IJCSS Vol 5 No 1 April 2011 pp 742 751 Cheraghchi M Didier F Shokrollahi A Invertible Extractors and Wiretap Protocols IEEE Transactions on Information Theory Volume 58 Issue 2 2012 pp 1254 1274 doi 10 1109 TIT 2011 2170660 Jikai T Chuankun W A Provable Authenticated Certificateless Group Key Agreement With Constant Rounds Journal of Communications and Networks Volume 14 Issue 1 2012 pp 104 110 Zhao S Aggarwal A Frost R Bai X A Survey of Applications of Identity Based Cryptography in Mobile Ad Hoc Networks IEEE Communications Surveys Tutorials Volume 14 Issue 2 2012 pp 380 400 doi 10 1109 SURV 2011 020211 00045 Shyamalendu Kandar Arnab Maiti Bibhas Chandra Dhara Visual Cryptography Scheme for Color Image Using Random Number with Enveloping by Digital Watermarking International Journal of Computer Science Issues Vol 8 Issue 3 No 1 2011 pp 543 549 Kamlesh Gupta Sanjay Silakari ECC over RSA for Asymmetric Encryption A Review International Journal of Computer Science Issues Vol 8 Issue 3 No 2 May 2012 pp 370 375 Nicanfar H Leung V C M EIBC Enhanced Identity Based Cryptography a Conceptual Design IEEE International Systems Conference SysCon 2012 pp 1 7 doi 10 1109 SysCon 2012 6189541 Y Fang X Zhu and Y Zhang Securing Resource Constrained Ad hoc Networks Wireless Communication Vol 16 No 2 2009 pp 24 29 Y Zhang W Liu W Lou and Y Fang Securing Mobile Ad hoc Networks with Certificateless Public Keys IEEE Transaction on Dependable Security and Computation Vol 3 No 4 2006 pp 386 399 doi 10 1109 TDSC 2006 58 Shazia Yasin Khalid Haseeb Rashid Jalal Qureshi Cryptography Based E Commerce Security A Review International Journal of Computer Science Issues Vol 9 Issue 2 No 1 March 2012 pp 132 137 Sanjay Jahdav Viddhulata Mohite A Data Hiding Technique Based on Length of English Text Using DES and Attacks International Journal of Research in Computer Science Volume 2 Issue 4 2012 pp 23 29 Shiguo Lian Jinsheng Sun Zhiquan Wang A block cipher based on a suitable use of the chaotic standard map Solitons and Fractals Vol 26 2005 pp 117 129 doi 10 1016 j chaos 2004 11 096 Kulis B and Darrell T Learning to hash with binary reconstructive embeddings In NIPS 22 2010 Landwehr C Boneh D Mitchell J C Bellovin S M Landau S Lesk M E Privacy and Cybersecurity The Next 100 Years IEEE Proceedings Volume 100 Issue Special Centennial Issue 2012 pp 1659 1673 doi 10 1109 JPROC 2012 2189794 Ritter T Linear Cryptanalysis A Literature Survey Available www ciphersbyritter com RES LINANA HTM Schaefer E Linear Cryptanalysis of Block Ciphers Available http math scu edu eschaefe linear pdf Bar El H Introduction to Side Channel Attacks Discretix Technologies Ltd Available www discretix com PDF Introduction 20to Side 20Channel 20Attacks pdf Chong H K Improved Differential Fault Analysis on AES Key Schedule IEEE Transactions on Information

    Original URL path: http://www.ijorcs.org/manuscript/id/41/samuel-king-opoku/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Secure Electronic Lock using PIC 16f628a Microcontroller
    16f628a Microcontroller International Journal of Research in Computer Science 2 no 5 2012 43 47 doi 10 7815 ijorcs 25 2012 047 Close Abstract The proposed system implements an electronic embedded lock that provides a great benefit over a traditional lock which uses only a manual key If in case the key is lost or stolen then anyone can open the lock using the key On the other hand losing a long and complex password or getting it stolen is harder as compared to a traditional key Further a combination of both the manual key with a computerized password makes the system more secure A longer password will reduce the possibilities of getting the code broken and opening the lock Our system comprises of a keypad and HD44780 20x2 LCD along with a PIC16f628a microcontroller The firmware controls these components in such a way that interaction with keypad is very easy and smooth The LCD provides user with messages and notifications to inform about the current system state User can perform operations such as opening and closing the lock changing the current password in the microcontroller EEPROM and clearing a single digit while entering the password when wrong digit entered back space The proposed system s firmware is developed using assembly language with MPLAB development environment It is tested and implemented at the actual hardware level with proper functioning of the system and it is completely bug free References Cited By Milan Verle PIC Microcontrollers mikroElektronika 1st edition 2008 Nebojsa Matic PIC Microcontrollers on line MikroElektronika 2000 Microchip PIC16F628x Data Sheet Microchip Hitachi LCD HD44780 datasheet Hitachi Peter JAKAB Electronic Combination Lock based on PIC Online Available http jap hu electronic combination lock html DAT Simple Combination lock Project with keypad and LCD Online Available http www 8051projects net download

    Original URL path: http://www.ijorcs.org/manuscript/id/47/muhanad-hayder-mohammed/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • Ant Colony with Colored Pheromones Routing for Multi Objectives Quality of Services in WSNs
    18 23 July 2010 doi 10 1109 CEC 2010 5586264 Jiming Chen Junkun Li Shibo He Youxian Sun Hsiao Hwa Chen Energy Efficient Coverage Based on Probabilistic Sensing Model in Wireless Sensor Networks IEEE Communications Letters vol 14 no 9 pp 833 835 September 2010 doi 10 1109 LCOMM 2010 080210 100770 Marco Dorigo Gianni Di Caro Luca M Gambardella Ant Algorithms for Discrete Optimization Artifical life vol 5 no 2 pp 137 172 1999 doi 10 1162 106454699568728 M Dorigo T Stützle Ant Colony Optimization MITpress 2004 Dorigo M Maniezzo V Colorni A Ant system optimization by a colony of cooperating agents IEEE Transactions on Systems Man and Cybernetics Part B Cybernetics vol 26 no 1 pp 29 41 Feb 1996 doi 10 1109 3477 484436 Dorigo M Gambardella L M Ant colony system a cooperative learning approach to the traveling salesman problem IEEE Transactions on Evolutionary Computation vol 1 no 1 pp 53 66 Apr 1997 doi 10 1109 4235 585892 Gambardella L M Taillard E Dorigo M Ant colonies for the Quadratic Assignment Problem Journal of the Operational Research Society 50 pp 167 176 Feb 1999 doi 10 2307 3010565 Kemal Akkaya Mohamed Younis A survey on routing protocols for wireless sensor networks Ad Hoc Networks vol 3 issue 3 pp 325 349 May 2005 doi 10 1016 j adhoc 2003 09 010 Muhammad Saleem Gianni A Di Caro Muddassar Farooq Swarm intelligence based routing protocol for wireless sensor networks Survey and future directions Information Sciences vol 181 issue 20 pp 4597 4624 October 2011 doi 10 1016 j ins 2010 07 005 Sohrabi K Gao J Ailawadhi V Pottie G J Protocols for self organization of a wireless sensor network IEEE Personal Communications vol 7 no 5 pp 16 27 Oct 2000 doi 10 1109 98 878532 He T Stankovic J A Abdelzaher T F Lu C A spatiotemporal communication protocol for wireless sensor networks IEEE Transactions on Parallel and Distributed Systems vol 16 no 10 pp 995 1006 Oct 2005 doi 10 1109 TPDS 2005 116 Felemban E Chang Gun Lee Ekici E MMSPEED multipath Multi SPEED protocol for QoS guarantee of reliability and Timeliness in wireless sensor networks Mobile Computing IEEE Transactions on vol 5 no 6 pp 738 754 June 2006 doi 10 1109 TMC 2006 79 Yanjun Li Chung Shue Chen Ye Qiong Song Zhi Wang Youxian Sun Enhancing Real Time Delivery in Wireless Sensor Networks With Two Hop Information IEEE Transactions on Industrial Informatics vol 5 no 2 pp 113 122 May 2009 doi 10 1109 TII 2009 2017938 G Di Caro Ant Colony Optimization and its Application to Adaptive Routing in Telecommunication Networks Ph D thesis Faculté des Sciences Appliquées Université Libre de Bruxelles Brussels Belgium 2004 Gianni Di Caro Marco Dorigo AntNet distributed stigmergetic control for communications networks Journal of Artificial Intelligence Research JAIR vol 9 issue 1 pp 317 365 August 1998 Thomas Halva Labella and Falko Dressler A bio inspired architecture for division of labour in SANETs

    Original URL path: http://www.ijorcs.org/manuscript/id/55/fatemeh-rismanian-yazdi/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive

  • From Physical to Virtual Wireless Sensor Networks using Cloud Computing
    possibilities of sharing the resources in order to ensure the availability and performance of physical sensors This paper assumes that the immense power of the Cloud can only be fully exploited if it is impeccably integrated into our physical lives The principal merit of this work is a novel architecture where users can share several types of physical sensors easily and consequently many new services can be provided via a virtualized structure that allows allocation of sensor resources to different users and applications under flexible usage scenarios within which users can easily collect access process visualize archive share and search large amounts of sensor data from different applications Moreover an implementation has been achieved using Arduino Atmega328 as hardware platform and Eucalyptus Open Stack with Orchestra Juju for Private Sensor Cloud Then this private Cloud has been connected to some famous public clouds such as Amazon EC2 ThingSpeak SensorCloud and Pachube The testing was successful at 80 The recommendation for future work would be to improve the effectiveness of virtual sensors by applying optimization techniques and other methods References Cited By C Lenzen P Sommer R Wattenhofer Optimal Clock Synchronization in Networks The 7th ACM Conference on Embedded Networked Sensor Systems SenSys 2009 2009 doi 10 1145 1644038 1644061 J Hill R Szewczyk A Woo S Hollar D Culler K Pister System architecture directions for networked sensors International Conference on Architectural Support for Programming Languages and Operating Systems 2000 doi 10 1145 356989 356998 J Koo R K Panta S Bagchi L Montestruque A Tale of Two Synchronizing Clocks The 7th ACM Conference on Embedded Networked Sensor Systems SenSys 2009 doi 10 1145 1644038 1644062 J Scott Miller Peter A Dinda Robert P Dick Evaluating A BASIC Approach To Sensor Network Node Programming The 7th ACM Conference on Embedded Networked Sensor Systems SenSys 2009 doi 10 1145 1644038 1644054 J Shneidman P Pietzuch J Ledlie M Roussopoulos M Seltzer M Welsh Hourglass An Infrastructure for Connecting Sensor Networks and Applications Harvard Technical Report TR 21 04 2004 Kevin Klues Chieh Jan Mike Liang Jeongyeup Paek Razvan Musaloiu E Philip Levis Andreas Terzis Ramesh Govindan TOSThreads Thread Safe and Non Invasive Preemption in TinyOS The 7th ACM Conference on Embedded Networked Sensor Systems SenSys 2009 doi 10 1145 1644038 1644052 Keiji Matsumoto Ryo Katsuma Naoki Shibata Keiichi Yasumoto Minoru Ito Extended Abstract Minimizing Localization Cost with Mobile Anchor in Underwater Sensor Networks The Fourth ACM International Workshop on UnderWater Networks WUWNet 2009 doi 10 1145 1654130 1654144 M Gaynor M Welsh S Moulton A Rowan E LaCombe and J Wynne Integrating Wireless Sensor Networks with the Grid IEEE Internet Computing Special Issue on Wireless Grids 2004 doi 10 1109 MIC 2004 18 Open Geospatial Consortium http www opengeospatial org Shuo Guo Ziguo Zhong Tian He FIND Faulty Node Detection for Wireless Sensor Networks Proc The 7th ACM Conference on Embedded Networked Sensor Systems SenSys 2009 pp 253 266 doi 10 1145 1644038 1644064 SensorML http vast uah edu SensorML T I

    Original URL path: http://www.ijorcs.org/manuscript/id/57/maki-matandiko-rutakemwa/interview-panel?post_id=152 (2016-05-01)
    Open archived version from archive



  •