Series-3 (Jan-Feb 2019)Jan-Feb 2019 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Download Cover Page
Paper Type | : | Research Paper |
Title | : | Networks Security Assessment of Unknown Attacks |
Country | : | Oman |
Authors | : | Dr. kamal Aldin Yousif |
: | 10.9790/0661-2101030112 |
Abstract: This research is used a combination of both known and unknown attacks, Not only unknownattacks are difficult to detect and mitigate, their attack scenarios are also unpredictable, although such attack scenarios consisting of unknown attacks arepossible, they are often not taken into account when hardening the networked system because it is difficult to measure the security posture of them On theother hand, the occurrence of unknown attacks is growing rapidly [1,2]. Thus there is an urgent need for assessing the combined effects of both known and unknown attacks,unknown attacks consisting of unknown vulnerabilities, unknown devices, and unknown attack paths. This research aims to address the aforementioned problems by classifying un-known attacks, and incorporate them into the HARM..
Keywords: HARM, unknown attacks, mitigate, attack scenarios.
[1]. WU, Y., FOO, B., MAO, Y., BAGCHI, S., AND SPAFFORD, E. Automated Adaptive Intrusion Containment in Systems of Interacting Services. Computer Networks 51, 5 (Apr. 2007), 1334–1360.
[2]. XIE, A., CAI, Z., TANG, C., HU, J., AND CHEN, Z. Evaluating NetworkSecurityWithTwo-LayerAttackGraphs. InProc.ofthe25thAnnual Computer Security Applications Conference (ACSAC2009)(2009), pp.127 –136.
[3]. XIE, P., LI, J., OU, X., LIU, P., AND LEVY, R. UsingBayesianNetworks for Cyber Security Analysis. In Proc. of IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010) (June 2010), pp. 211–220.
[4]. YACKOSKI, J., LI, J., DELOACH, S., AND OU, X. Mission-orientedMoving Target Defense Based on Cryptographically Strong Network Dynamics. InProc.ofthe8thAnnualCyberSecurityandInformationIntelligence Research Workshop (CSIIRW 2013) (New York, NY, USA, 2013), ACM, pp. 57:1–57:4.
[5]. YAGER, R. OWA Trees and Their Role in Security Modeling using Attack Trees. Information Sciences 176, 20 (2006), 2933–2959..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Bengali is one of the ten most spoken languages in the world, with almost 200 million speakers. Growing online resources reveal a clear need for Bengali language applications, retrieval systems and automatic text summarization. Designing a system to produce human quality summaries is difficult and therefore many researchers have focused on sentence or paragraph extraction, which is a kind of summarization. In this research work an intelligent technique is introduced in order to summarize the Bangla texts with the help of machine supported technology. This system can be widely used in effective Bangla text summarization which helps to extract the focal.......
Keywords: expert system, extraction, morphology, natural language processing, text summarization
[1] Joel Larocca Neto, Alexandre D. Santos, Celso A.A. Kaestner, Alex A. Freitas, "Document Clustering and Text Summarization"
[2] M. Sanderson, "Accurate user directed summarization from existing tools", in Proceedings of the 7'th International Conference on Information and Knowledge Management (CIKM98), 1998.
[3] Md Tawhidul Islam, Shaikh Mostafa Al Masum, "An algorithm for automatic text summarization of technical documents by building and minimizing information network of the source document" (ICCIT "05).
[4] Md Tawhidul Islam, Shaikh Mostafa Al Masum, "Bhasa: A Corpus-Based Information Retrieval and Summariser for Bengali Text", Internation Conference on Computer and Information Technology" (ICCIT "05).
[5] Hercules Dalianis," SweSum - A Text Summarizer for Swedish" http://www.nada.kth.se/nada/iplab/.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | An enhanced Sniffing Tool for Network Management |
Country | : | |
Authors | : | Bukie, P. T. || Oyo-Ita, E.U ||| Ideba, M. E. || Oboyi, J. |
: | 10.9790/0661-2101032634 |
Abstract: The use of packet sniffers is most effective in monitoring and troubleshooting computer Networks against vulnerabilities mostly threaten data security and integrity. However, an initial investigation showed that the efficiency of existing packet sniffing platforms suffered setbacks in the areas of malware detection, platform dependency and user interface. As such, an easy graphical user interface (GUI) and minimal memory requirements were established as the most essential features required to effectively monitor network activities. This report analyses the limitations of existing packet sniffing tools, using an Object Oriented Modelling (OOM) design methodology; in a bid to develop a platform independent tool with simpler GUI, better performance and security whereby a user can perform different routines built into the packet sniffing system by selecting the File or View menus for sub menus to appear for selection, in less time.
[1]. Ansari, S., Rajeev, S., and Chandrashekar, H. (2002). Packet Sniffing: A BriefIntroduction. IEEE Potentials, 21(5), 17-19.
[2]. Asrodia, P., Sharma, V. (2013) Network Monitoring and Analysis by PacketSniffing Method.International Journal of Engineering Trends and Technology Volume4Issue5. [Online] Available from <http://www.ijettjournal.org/volume-4/issue-5/IJETT-V4I5P160.pdf> [July 2018]
[3]. Bhandari, A. and Ailawadhi, A. (2017). Literature Review on an Approach to Detect Packets Using Packet Sniffing.Journal of Network Communications and Emerging Technologies [online] Available from <www.jncet.org> [June 2018]
[4]. Borja, F. (2011) TRAFFIC ANALYSIS WITH WIRESHARK [online] available from
<https://www.csirtcv.gva.es/sites/all/files/downloads/cert_trafficwireshark.pdf > [August, 2018]
[5]. Bradley, M. (2017). What is a Network Sniffer? Both Admins and Hackers Can Capture Network Traffic. Retrieved from https://www.lifewire.com/definition-of-sniffer-817996 on 24/10/2017.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Noise reduction is the process of removing noise from an image. Removal of noise is the most important task for preprocessing on biomedical MRI brain images. Filtering is a tool for noise removing. In this paper we compare the performance of four filters- Median Filter, Averaging/Mean Filter, Gaussian Filter, Wiener filter. This paper presents which filter is best for removing noise like Gaussian, Salt & Pepper, Poisson, and Speckle noise from stoned kidney image. Which filter is best, is measured by calculating the MSE and PSNR of filtered image..
Keywords: MRI (Magnetic Resonance Imaging), Brain Tumor, Filters (Mean, Median, Wiener, Gaussian), Preprocessing, MSE, PSNR..
[1]. B. Julesz, "Visual Pattern Discrimination," IRE Trans. Information Theory, vol. 8, pp. 84-92, 1962.
[2]. T. Randen and J. Husøy, "Filtering for Texture Classification: A Comparative Study," IEEE Trans. Pattern Analysis and Machine Intelligence, vol. 21, no. 4, pp. 291-310, Apr. 1999.
[3]. M. Tuceryan and A.K. Jain, "Texture Analysis," Handbook Pattern Recognition and Computer Vision, C.H. Chen, L.F. Pau, and P.S.P. Wang, eds., ch. 2, pp. 235-276, World Scientific, 1993.
[4]. J. Zhang and T. Tan, "Brief Review of Invariant Texture Analysis Methods," Pattern Recognition, vol. 35, no. 3, pp. 735-747, 2002.
[5]. R.M. Haralick, K. Shanmugam, and I. Dinstein, "Textural Features for Image Classification," IEEE Trans. Systems, Man, and Cybernetics, vol. 3, no. 6, pp. 610-621, Nov. 1973.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Network traffic anomalies could refer to a potential intrusion in the network, so detecting anomalies is important for the detection and prevention of security attacks. Earlier researches in this part and commercially obtainable Intrusion Detection Systems (IDS) are, for the most part based on signature. The signature-based task is the need to update the signature of the datasets when there are new attack signatures and thus, they are not appropriate for detect real-time network anomalies. The recent trend in detecting anomalies is based on classification approaches.........
Keywords: Machine learning, Network Intrusion Detection System, Data mining..
[1]. J. Cui, Y. Zhang, Z. Cai, A. Liu, and Y. Li, "Securing Display Path for Security-Sensitive Applications on Mobile Devices," C. Comput. Mater. Contin, vol. 55, pp. 17–35, 2018.
[2]. A. Pradeep, S. Mridula, and P. Mohanan, "High security identity tags using spiral resonators," Comput. Mater. Contin., vol. 52, no. 3, pp. 185–195, 2016.
[3]. R. Bace and P. Mell, "NIST special publication on intrusion detection systems," BOOZ-ALLEN AND HAMILTON INC MCLEAN VA, 2001.
[4]. M. Roesch, "Snort: Lightweight intrusion detection for networks.," in Lisa, 1999, vol. 99, no. 1, pp. 229–238.
[5]. M. Lichman, "Datasets | Research | Canadian Institute for Cybersecurity | UNB," 2017. [Online]. Available: https://www.unb.ca/cic/datasets/index.html. [Accessed: 29-Dec-2018]..
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This proposition is given to protection safeguarding characterization and affiliation rules mining over unified information mutilated with randomisation-based techniques which alter singular esteems indiscriminately to give a normal level of security. It is expected that lone contorted esteems and parameters of a mutilating system are known amid the way toward building a classifier and mining affiliation rules. In this proposition, we have proposed the advancement MMASK, which wipes out exponential multifaceted nature of assessing a unique help of a thing set as for its cardinality, and, in outcome, makes the protection saving revelation of incessant thing..........
Keywords: Choice Tree, Minimum Description Length (MDL), Decision tree, Classification by Aggregating EPs(CAEP), elevated amounts of security..
[1]. Charu C. Aggarwal and Philip S. Yu. Privacy-Preserving Data Mining: Models and Algorithms. Springer Publishing Company, Incorporated, 2008.
[2]. Dakshi Agrawal and Charu C. Aggarwal. On the design and quantification of pri-vacy preserving data mining algorithms. In PODS '01: Proceedings of the twentieth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 247–255, 2001.
[3]. Rakesh Agrawal, Tomasz Imielinski, and Arun N. Swami. Mining association rules between sets of items in large databases. In Peter Buneman and Sushil Jajodia, editors, SIGMOD Conference, pages 207–216. ACM Press, 1993.
[4]. Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, and Yirong Xu. Order-preserving encryption for numeric data. In Gerhard Weikum, Arnd Christian König, and Stefan Deßloch, editors, SIGMOD Conference, pages 563–574. ACM, 2004.
[5]. Rakesh Agrawal, Heikki Mannila, Ramakrishnan Srikant, Hannu Toivonen, and A. Inkeri Verkamo. Fast discovery of association rules. In Advances in Knowledge Discovery and Data Mining, pages 307–328. AAAI/MIT Press, 1996.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | A Novel Algorithm for mining Positive and Negative Association rules |
Country | : | India |
Authors | : | Sachin Sharma || Dr Shaveta Bhatia |
: | 10.9790/0661-2101036266 |
Abstract: So far, severalmethods have been reflected about positive association rules based on frequent itemsets in databases. They have not measured the problem of drawing out negative rules/ itemsets. These negative itemsets also deliberate the identical itemsetsas well as negated itemsets. These negative itemsets are suitable in market-basket analysis to recognize the products that counter and go in sink. This paper presents a mathematical model to extract positive and negative association rules/ itesmsets. The experimental results show that the proposed model NAR gives better results than the previous model.
Keywords: Positive, Negative, Support, Confidence, Mininterest..
[1]. Li-Min Tsai, Shu-Jing Lin and Don-Lin Yang, "Effective Mining of Generalized Negative Association Rules", Proceedings of IEEE Conference on Granular Computing, pp. 113-117, 2010.
[2]. J. Han, J. Pei, and Y. Yin, "Mining frequent patterns without candidate generation," ACM SIGMOD Record,vol.29,no.2,pp. 1–12, 2000.
[3]. Li Min Tsai, Shu Jing Lin and Don Lin Yang, "Effective Mining of Generalized Negative Association Rules", Proceedings of International Conference on Granular Computing, pp. 163-167, 2010.
[4]. M. Delgado, M. D. Ruiz, D. S´anchez, and J. M. Serrano, "A formal model for mining fuzzy rules using the RL representation theory," Information Sciences, vol. 181, no. 23, pp. 5194–5213, 2011.
[5]. Brin,S., Motwani,R. and Silverstein,C., " Beyond Market Baskets: Generalizing Association Rules to Correlations," Proc. ACM SIGMOD Conf., pp.265-276, May 1997.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:Vibration conditions of discrete multi-degrees-of-opportunity (MDOF) basic frameworks is
arrangement of differential conditions. In direct frameworks, the differential conditions are likewise straight.
Different logical and numerical strategies are accessible for illuminating the vibration conditions in auxiliary
elements. In this paper adjusted differential change strategy (MDTM) as a semi-diagnostic methodology is
summed up for the arrangement of differential conditions and is used for tackling the vibration conditions of
MDOF frameworks. The MDTM is a recursive strategy which is a half breed of Differential Transform Method
(DTM), Pade' approximant and Laplace Transformation. A progression of models including constrained and
free vibration of MDOF frameworks with old style and non-old style damping are additionally fathomed by this
strategy. Correlation of the outcomes
Keywords: Modified Differential Transform Method; Multi-Degrees-of-Freedom Systems; Pade' Approximant; Vibration Equation.
[1] Humar, J.L., Dynamics of Structures. second ed., A. A. Balkema Publishers, 2002.
[2] Chopra, A.K., Dynamics of Structures. fourth ed., Prentice Hall (New Jersey), 2012.
[3] Zhou, J. K. "Differential Transformation and Its Applications for Electronic Circuits, Huazhong Science & Technology Universi ty
Press, China." (1986).
[4] Odibat, Zaid, and Shaher Momani. "A generalized differential transform method for linear partial differential equations of fractional
order." Applied Mathematics Letters 21, no. 2 (2008): 194-199.
[5] Ertürk, Vedat Suat, and Shaher Momani. "Solving systems of fractional differential equations using differential transform method."
Journal of Computational and Applied Mathematics 215, no. 1 (2008): 142-151.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Maintenance of the Evaluation Model for OOS |
Country | : | India |
Authors | : | Pappu sharada || Archana Panda |
: | 10.9790/0661-2101038592 |
Abstract:Maintainability is a key factor of software quality models as mentioned in ISO 9126 and by other
researchers. Maintainability evaluation at early phase of development life cycle like the design phase is
preferred as it assists the software developers to improve their design before the start of actual coding. This in
turn decreases the maintenance cost.
This paper proposes a Maintainability Evaluation Model (MMOOD) that works at the design phase in the life
cycle of software development. The proposed model evaluates maintainability in terms of its key contributor's
viz. Changeability and Stability. The experimental validation of the developed maintainability evaluation model
was done using industrial software projects.....
Keywords: Software Maintenance, Maintainability, Maintainability Factors, Design Phase, Maintainability Evaluation, Object Oriented Design Properties.
[1]. Aggarwal K.K. and Yogesh Singh. Software Engineering (New Age International, 2005).
[2]. Singh, Hardeep and Aseem Kumar, A Novel Approach to Enhance the Maintainability of Object Oriented Software Engineering
During Component Based Software Engineering, International Journal of Computer Sci. and Mobile Computing 3.3 ,2014,778-786.
[3]. Al Dallal and Jehad, Object-oriented class maintainability prediction using internal quality attributes. Information and Software
Technology 55.11, 2013, 2028-2048.
[4]. Singh, Pradeep Kumar, and Om Prakash Sangwan, Aspect Oriented Software Metrics Based Maintainability Assessment:
Framework and Model, The Next Generation Information Technology Summit (4th International Conference) 1-07, 2013.
[5]. Alisara Hincheeranan and Wanchai Rivepiboon, A Maintainability Estimation Model and Tool, International Journal of Computer
and Communication Engineering, Vol. 1, No. 2, July 2012.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:The wind farms which are recently installed are of erratic speed type. Due to the erratic speed and
unsymmetrical fault condition the voltage become unbalance. Whenever the voltage sag/swell is present in a
system, the induction generator may perhaps consume a bulky quantity of reactive power, the results of
progression of faults and voltage collapse is due to the speed deviates as of synchronous speed. Whenever
unsymmetrical faults occur in a wind farm, positive sequence voltages are formed. DVR is connected to wind
system is investigated using MPPT with synchronous reference frame (SFR) control action as demanded in
definite grid code. A new control technique is purposed for recovery of positive sequence voltages under
asymmetrical fault and where the system speed is variable.
Key Word:DVR, wind fram, PWM technique, positive sequence voltage, synchronous reference fram control, MPPT controller
[1]. Anto Joseph, Nagarajan And Antony Mary. A Multi Converter Based Pure Solar Energy System With High Efficiency MPPT
Controller. International Journal of Electrical Engineering and Technology (IJEET). 4 (4), 2013, pp.205–212.
[2]. Shimi S.L, Dr. Thilak Thakur, Dr. Jagdish Kumar, Dr. S Chatterji and Dnyaneshwar Karanjkar, Anfis Controller For Solar Powered
Cascade Multilevel Inverter. International Journal of Electrical Engineering & Technology, 3 (1), 2012, pp. 234-240.
[3]. Chinmayi and Dr. B.G. Shivaleelavathi, Enhancement of Fundamental RMS Output Voltage of 5-Level Cascaded H-Bridge
Multilevel Inverter Using Modified Multi-Carrier PWM Technique. International Journal of Electrical Engineering & Technology,
7 (1), 2016, pp. 17-29.
[4]. Vishal Rathore and Dr. Manisha Dubey , Speed Control of Asynchronous Motor Using Space Vector PWM Technique.
International Journal of Electrical Engineering & Technology, 3 (3), 2012 , pp. 222-233
[5]. Mohd. Mohsin Khan and Dr. Amrit Kumar Roy, CFD Simulation of Wind Effects on Industrial RCC Chimney. International
Journal of Civil Engineering and Technology, 8(1), 2017, pp. 1008–1020.