A correlation based fuzzy model for network intrusion detection
The network intrusion becomes ever growing problem. The complexity present in the collected network data set is absence of clear boundary between anomaly connection and normal connection. However fuzzy logic can well address this problem. In earlier works, combining fuzzy logic and data mining to develop fuzzy rules are explored to address this problem. In this paper, a new fuzzy model is developed to detect anomaly connections. The developed model is tested with NSLKDD data set. The model gives better result.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Learning-based compiler level optimization of branching statement layout using execution patterns and dynamic code reordering
Code layout is an important factor that determines the performance of any application. For branching intensive loops where decisions have to be made among several branching paths (as in real time systems), an optimized layout of the conditional statements can increase the performance largely. Current methods can predict branches dynamically using speculative execution which can be resource intensive. Static branch prediction techniques are not as accurate. In this work a compiler based optimization for branching instructions by code reordering has been proposed. The proposed design consists of a code reordering component that along with the compiler can dynamically generate layout-optimized code, by reordering the conditions in the source program. The reordering is done base on dynamic run-time execution patterns. Based on the current execution pattern and the history, the most optimal program can be run, minimizing evaluation of conditions.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Nephele: Dynamic Allocation and Parallel Execution Security Model in Cloud Computing
In present year ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IAAS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data and making it easy for customers to access these. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this project the data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IAAS clouds for both, task scheduling and execution is constructed. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Singular Value Decomposition (SVD) Before Covariance Based PCA for Image De-noising
This paper describes an efficient approach of using (SVD) before covariance PCA. Singular Value Decomposition (SVD) is a method of finding insignificant pixel values from an image. Though covariance PCA is used to de-correlate the original data set by extracting principle components of data set but there also left some noises. Singular Value Decomposition (SVD) is a method that discards insignificant pixel values from an image without affecting the quality of the image. In this method a pixel and its nearest neighbors are considered as the training samples recognized by using block matching regarded as Local Pixel Grouping (LPG). Experimental result shows that the use of SVD before covariance based PCA demonstrate that the de-noising performance of image is improved compared with state-of-art de-noising algorithm.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An approach to Handle Man in Middle Attack in Cluster based Architecture
This paper presents wireless ad hoc network which communicate with each other by forming a multi-hop radio network and maintaining connectivity in a decentralized manner. The principle behind ad hoc networking is multi-hop relaying, which means that the messages are transmitted by the other nodes if the target node is not directly reachable. For communications with the nodes which are not within the radio range of nodes to the route must be taken from the intermediate nodes to reach the destination. These intermediate nodes acts as router which receives the data coming from the source and forwards the data to destination This situation is of potential security concern as there can be attack possible by the intermediate node like Man in Middle Attack. Hence an authentication procedure is be used for authenticating the mobile nodes to each other and proper encryption decryption mechanisms is also employed. Also intermediate nodes can act as malicious nodes which must be removed or alternate route should be found which does not include nodes already used in previous route. Thus we have developed architecture will provide secure routing mechanism which will use two kinds of encryption techniques. Then the possible attacks are being analyzed and removed from the architecture.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Effect of investment in information technology system on providing desired services of accounting information system
Today, with advances in information and communication technologies and the emergence of information management system, using of these technologies in organizations is inevitable. Therefore, only managers who can invest in areas related to information technology and management system of information will be successful in enterprise management system. However, it is an important discussion that how these investments should be performed or how much it is invested? Moreover, managers must be aware of the effectiveness of using information technology and information management systems. Actually, Information Technology impacts necessary indicators for the success of today’s organization. Therefore, this study investigates the application of IT systems (IT) and management information systems (MIS) on effectiveness of these systems based on users’ view. Among the key indicators of information technology system, some indicators are selected as follows: increasing the speed of work performance, increasing accuracy of work performance, timely retrieval of information, more storage and faster access to information. In addition, the effect of these indices on providing good services in the financial reporting is investigated.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Academic Coding Guideline Model OCG - Open Coding Guidelines For Windows (An Organized Code Creation Model)
Every software company has its own set of guidelines that increases code readability, reuse and helps in its storage in organized storage structure .These guidelines also help in the determination of various attributes of code such as complexity, duplicity, warnings, memory leaks, coverage etc. However coding guidelines/approaches as such are not present in the field of academics. Scholars of educational institutions generally concentrate mostly on logic (brute force quality approach) while coding, against writing documentable clean code or understanding code’s attributes. Also end evaluation/delivery in a software company is dependent on clean code with various attributes such scenario is not possible in academic framework all together and mostly is done manually. The paper tries to bridge this gap by analyzing the role of an organized code creation model and its effect on various stakeholders in academic Eco-system and suggesting one such open source Code Guideline Model OCG and providing its implementation through a template.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Automatic Line Scratch Detection and Removal in Digitized Film Sequence
Video restoration or old film restoration is challenging but sometimes necessary process. Line scratches in old videos appearas thin bright or dark lines which are roughly vertical and straight. We propose, Frame – By – Frame line scratch detection algorithm to detect scratches from old films. For false detection temporal algorithm is used. Some assumptions and hypothesis from old scratch removal strategies are eliminated from Frame-By-Frame line scratch detection algorithm so that variety of line scratches can be detected. Contrario methodology and local statistical estimation is used in combinatorial way for robustness. Using these technologies over detection and confusion creating areas are greatly reduced. Vertical structure in video can cause false detection but temporal filtering algorithm eliminates false detection by considering and analyzing unity of underlying scenes. We contribute for removal of scratches using pixel filling technique. This concept of detecting and eliminating line scratch from video contribute fine methods for video restoration.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Design of memory controller based on AMBA AHB protocol
The performance of a computer system is heavily dependent on the characteristics of it’s interconnect architecture. A poorly designed system bus can throttle the transfer of instructions and data between memory and processor, or between peripheral devices and memory. This communication bottleneck is the focus of attention among many microprocessor and system manufacturers have adopted a number of bus standards. Hence memory access time has been a bottleneck which limits system performance. Memory controller (MC) is designed to tackle this problem. The Advanced Microcontroller Bus Architecture (AMBA) specification defines an on chip communications standard for designing high-performance embedded microcontrollers. This paper focuses on how to build an AMBA Advanced High performance Bus (AHB) based memory controller that can work efficiently in multi- master and multi- slave communication model.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Dynamic allocation and parallel optimization theory in Sharon – nephele cloud
In present year ad-hoc parallel data processing has emerged to be one of the killer applications for Infrastructure-as-a-Service (IAAS) clouds. Major Cloud computing companies have started to integrate frameworks for parallel data and making it easy for customers to access these. However, the processing frameworks which are currently used have been designed for static, homogeneous cluster setups and disregard the particular nature of a cloud. Consequently, the allocated compute resources may be inadequate for big parts of the submitted job and unnecessarily increase processing time and cost. In this project the data processing framework to explicitly exploit the dynamic resource allocation offered by today’s IAAS clouds for both, task scheduling and execution is constructed. Particular tasks of a processing job can be assigned to different types of virtual machines which are automatically instantiated and terminated during the job execution.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]