Volume-1 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Analysis of Binpacking |
Country | : | India |
Authors | : | Mrs. Nirmala J |
: | 10.9790/0661-0110109 |
Keywords - NP complete, P complete ,Bin Packing
[1] Garey, M., and Johnson, D. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. San Francisco: W.H. Freeman.
[2] Martello, S., and Toth, P. 1990a. Bin-packing problem. In Knapsack Problems: Algorithms and Computer Implemen-tations. Wiley. chapter 8, 221–245.
[3] Martello, S., and Toth, P. 1990b. Lower bounds and reduction procedures for the bin packing problem. Discrete Applied.
[4] Mathematics 28:59–70.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Buffer Overflow Attack |
Country | : | India |
Authors | : | Samanvay Gupta |
: | 10.9790/0661-0111023 | |
[2] "Aleph One". Smashing The Stack For Fun And Profit. Phrack, 7(49), November 1996.
[3] "Mudge". How to Write Buffer Overflows. http:// l0pht.com/advisories/bufero.html,1997.
[4] Nathan P. Smith. Stack Smashing vulnerabilities in the UNIX Operating System. http://millcomm.com/ nate/machines/security/stack-smashing/natebuffer.ps, 1997.
[5] "DilDog". The Tao of Windows Buffer Overflow.http://www.cultdeadcow.com/cDc_files/cDc-351/, April 1998.
[6] klog. The frame pointer overwrite. Phrack Magazine, 55(9), 1999.
[7] Aleph One. Smashing the stack for fun and pro_t. Phrack Magazine, 49(14), 1996.
[8] C. Cowan, C. Pu, D. Maier, H. Hinton, J. Walpole, P. Bakke,S. Beattie, A. Grier, P. Wagle, and Q. Zhang, "Stackguard:Automatic Adaptive Detection and Prevention of Buffer-Overflow Attacks," Proc. Seventh USENIX Security Symp.(Security ‟98), Jan. 1998
[9] T. ckerChiueh and F.-H. Hsu, "Rad: A Compile-Time Solution toBuffer Overflow Attacks," Proc. 21st Int‟l Conf. DistributedComputing Systems (ICDCS), 2001.
[10] R. Chinchani and E.V.D. Berg, "A Fast Static Analysis Approach to Detect Exploit Code inside Network Flows," Proc. Eighth Int‟l Symp.Recent Advances in Intrusion Detection (RAID), 2005.
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Expected zone, GPS, MANET, Request zone, Wireless LAN.
[2] http://webhome.csc.uvic.ca/~wkui/Courses/wireless/Lecture4.pdf.
[3] Young Bae Ko. and Nitin H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks", in Proc. 4th annual ACM/IEEE international conference on Mobile computing and networking, 1998.
[4] Young Bae Ko. , Nitin H. Vaidya, "Location-Aided Routing (LAR) in mobile ad hoc networks" Wireless Networks,Vo. 6 issue 4 pp. 307-321,July 2000.
[5] Angajala Srinivasa Rao, Somu Ventateswarku, Gogineni Rajesh Chandra, " LAR Protocol for Ad Hoc Wireless Networks using GPS", March 2009.
[6] V. Hnatyshin, M. Ahmed, R. Cocco, D. Urbano, "A comparative study of location aided routing protocols for MANET" , Wireless Days (WD), IFIP 2011.
[7] F. De Rango, A. Iera, A. Molinaro, S. Marano, "Multi-step increase of the forwarding zone for LAR protocol in ad hoc networks", Proceeding of the 57th IEEE Semiannual Vehicular Technology Conference(2003), Vol. 1, pp. 186 – 190, 2003.
[8] F. De Rango, A. Iera, A. Molinaro, S. Marano, "A modified location-aided routing protocol for the reduction of control overhead in ad-hoc wireless networks" Proceeding of 10th international Conference on Telecommunications (2003), Vol. 2, pp. 1033-1037, 2003.
[9] H. Al-Bahadili, " LAR-1P: An Efficient Hybrid Route Discovery Algorithm for MANETs", Proceeding of the 5th International Workshop on Performance Evaluation for Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN 2008), 2008.
[10] Dipankar Deb, Srijita Barman Roy, and Nabendu Chaki, "LACBER: A New Location Aided Routing Protocol For GPS Scarce MANET", International Journal of Wireless & Mobile Networks (IJWMN), Vol 1, No 1, August 2009.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Token Sequencing Approach to Prevent SQL Injection Attacks |
Country | : | India |
Authors | : | ManveenKaur, Arun Prakash Agrawal |
: | 10.9790/0661-0113137 | |
Keywords-Group, Malicious, SQLIA, Token, Vulnerability
[2] http://www.unixwiz.net/techtips/sql-injection.html
[3] http://cwe.mitre.org/documents/vuln-trends.html
[4] http://ferruh.mavituna.com/sql-injection-cheatsheet
[5] Preventing sql injection attacks Using AMNESIA William G.J Halfondand Alessandro Orso Georgia Institute of Technology. www.cc.gatech.edu/orso/papers/halfond.orso.ICSEDEM006.Presentation.pdf
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Evolution of Cloud Storage as Cloud Computing Infrastructure Service |
Country | : | India |
Authors | : | R. Arokia Paul Rajan, S. Shanmugapriyaa |
: | 10.9790/0661-0113845 |
Key words: Cloud Computing, Cloud Storage, Cloud Storage API, IaaS, issues, reference model.
[1] Daniel J. Abadi, Data Management in the Cloud: Limitations and Opportunities, IEEE Data Engineering Bulletin, Volume 32, March 2009, 3-12.
[2] James Broberg, Rajkumar Buyya, Zahir Tari, MetaCDN: Harnessing "Storage Clouds‟ for high performance content delivery, Journal of Network and Computer Applications, 1012–1022, 2009.
Books:
[3] Eric A. Marks, Bob Lozano, Executive's Guide to Cloud Computing (John Wiley & Sons Inc, pp. 25-40, 2010).
[4] Anthony T. Velte, Toby J. Velte, Robert Elsenpeter, Cloud Computing: A Practical Approach (McGraw Hill Publications, pp 135 – 144, 2010).
[5] Linda Xu, Miklos Sandorfi and Tanya Loughlin, Cloud Storage for Dummies (Wiley Publishing, pp. 5-24, 2010).
[6] Wu Jiyi,Ping Lingdi,Pan Xuezeng.Cloud Computing: Concept and Platform,Telecommunications Science,12:23-30, 2009.
[7] Storage Networking Industry Association.Cloud Storage Reference Model,Jun.2009.
Thesis:
[8] Srikumar Venugopal, Scheduling Distributed Data-Intensive Applications on Global Grids, Doctoral diss., Department of Computer Science and Software Engineering, The University of Melbourne, Australia, July 2006.
Proceedings Papers:
[9] Nicolas Bonvin, Thanasis G. Papaioannou and Karl Aberer, A Self-organized, Fault-tolerant and Scalable replication scheme for Cloud storage, SoCC '10 Proceedings of the 1st ACM symposium on Cloud computing, New York, USA, 2010, 205-216.
[10] Wenying Zeng, Yuelong Zhao, Kairi Ou, Wei Song, Research on cloud storage architecture and key technologies, ICIS '09: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human, ACM New York, NY, USA, 2009, 1044-1048.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Design and Analysis of 16 Bit Reversible ALU |
Country | : | India |
Authors | : | Lekshmi Viswanath, Ponni.M |
: | 10.9790/0661-0114653 |
Key words: Reversible logic circuits, Reversible logic gates, Reversible adder/subtractor, Reversible logic unit, Reversible ALU.
[1] Landauer, R., "Irreversibility and heat generation in the computing process", IBM J. Research and Development, vol. 5 (3): pp. 183-191, 1961.
[2] Bennett, C.H., "Logical reversibility of computation", IBM J. Research and Development, vol. 17: pp. 525-532, 1973
[3] Ravish Aradhya H V, Praveen Kumar B V, Muralidhara K N "Design of Control unit for Low Power ALU Using Reversible Logic" International Journal of Scientific & Engineering Research Volume 2, Issue 9, September-2011.
[4] B. Raghu Kanth1, B. Murali Krishna2, G. Phani Kumar3, J. Poornima4, K. Siva Rama Krishna "A Comparitive Study Of Reversible Logic Gates"International Journal of VLSI & Signal Processing Applications, Vol.2,Issue 1, Feb 2012,
Conference papers
[5] Himanshu Thapliyal ,Nagarajan Ranganathan "A New Reversible Design of BCD Adder" IEEE conference on Design and automation, 2011 pp.1-4.
[6] Zhijin Guan, Wenjuan Li, Weiping Ding, Yueqin Hang, Lihui Ni"An Arithmetic Logic Unit design based on reversible logic gates "IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PacRim), 2011.
[7] Thapliyal H, Srinivas M.B, "Novel Reversible TSG Gate and Its Application for Designing Components of Primitive Reversible/Quantum ALU,"Fifth International Conference on Information, Communications and Signal Processing, 2006.
[8] Madhusmita,SisiraKanta,JagannathSatpathy,MerajSaheeL"Design of Arithmetic Circuits Using Reversible Logic Gates and Power Dissipation Calculation"2010 International Symposium on Electronic System Design, Dec 2010, pp 85-90.
[9] H.Thapliyal,M.B Srinivas "Novel design and reversible logic synthesis of multiplexer based full adder and multipliers" 48th Midwest Symposium on Circuits and Systems, 2005.
[10] Matthew Morrison, Matthew Lewandowski, Richard Meana, Nagarajan Ranganathan, "Design of a novel reversible ALU using an enhanced carry look- ahead adder" 11th IEEE Conference on Nanotechnology (IEEE-NANO), 2011
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | JTAG Architecture with Multi Level Security |
Country | : | India |
Authors | : | Pooja Ajay Kumar, P. Sathish Kumar, Aditi Patwa |
: | 10.9790/0661-0115459 |
Keywords- JTAG, DFT, Boundary Scan, Security, AES, Authorization, Privilege Levels.
[1] IEEE Standard Test Access Port and Boundary Scan Architecture. IEEE Standard 1149.1, 2001.
Journal Paper
[2] Kurt Rosenfeld and Ramesh Karri, Attacks and Defenses for JTAG, Design and Test of Computers, IEEE. 2009.
Conference Papers
[3] Luke Pierce and Spyros Tragoudas, Multi-Level Secure JTAG Architecture, IEEE 17th International On-Line Testing Symposium, Pages 208-209, 2011
[4] R.F. Buskey and B.B. Frosik. Protected jtag. In International Conference on Parallel Processing Workshops, 2006, pages 8 pp.–414, 2006.
Proceeding Papers
[5] Chih-Chung Lu and Shau-Yin Tseng, "Integrated Design of AES Encrypter and Decrypter", Proc. IEEE Int. Conf. on Application-Specific Sytems, Architectures, and Processors, (ASAP'02), pp. 277-285, 2002.
Chapters in Books
[6] J. Menezes, P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography, (CRC Press LLC., 1997).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Stock Market Index value prediction using Artificial Neural Network |
Country | : | India |
Authors | : | Dinesh Kumar Singh |
: | 10.9790/0661-01016064 |
Abstract: Utilizing artificial neural networks (ANNs) for predicting stock market values, such as those of the Indian Stock Exchange (ISE) market index, stands as a highly valuable application. Your initial research exhibits thoroughness, particularly in the selection of crucial input factors like the preceding day's index value, the INR/USD exchange rate, the overnight interest rate, and dummy variables representing weekdays. This underscores a comprehensive understanding of potential factors influencing stock market fluctuations in India.
The standard practice of training ANN models with approximately 90% of the dataset and evaluating them with the remaining.....
Keywords: Artificial Intelligence, Neural Network, Stock Market
[2] Kimoto, T., Asakawa, K., Yoda, M. and Takeoka, M. (1990) Stock Market Prediction System with Modular Neural Networks. 1990 IJCNN International Joint Conference on Neural Networks, San Diego, 17-21 June 1990. https://doi.org/10.1109/IJCNN.1990.137535
[3] Mizuno, H., Kosaka, M., Yajima, H. and Komoda N. (1998), Application of Neural Network to Technical Analysis of Stock Market Prediction, Studies in Informatica dControl,Vol.7,No.3,pp.111-120.
[4] Sexton, R.S., R.E.Dorsey And J.D.Johnson(1998), Towards Global Optimization Of neural networks: A comparison of the genetic algorithm and backpropagation, Decision Support Systems22,171-185.
[5] Yildiz, B. (2001), Use of Artificial Neural Networks in Prediction of Financial Failures (Turkish), Journal of IMKB, Vol.5, No.17..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Artificial Intellingence in Academic Libraries |
Country | : | India |
Authors | : | Dinesh Kumar Singh |
: | 10.9790/0661-01016570 |
Abstract: Artificial intelligence (AI) in libraries refers to the growing trend of programming computers to perform tasks that traditionally role on human intelligence. The ultimate goal is to develop computer systems or machines that can think and act like humans, potentially revolutionizing the field of librarianship. Including expert systems to provide reference services, robots that perform tasks such as reading and shelving, and virtual reality for experiential rich learning. Although some fear that the integration of AI will create a divide between librarians and users, it is more likely that it will enhance their capabilities rather than replace their roles. This will lead to better service delivery, ultimately enhancing the relevance of libraries in our ever-changing digital society. This article aims to investigate different uses of AI in libraries.....
Keywords: Artificial Intelligence; Robotics, expert systems, natural language processing, pattern recognition and robotics, Information and Communication Technology, issues and challenges
[3]. Balleste, R. (2007). A Hypothetical Case Study: Creating AI Assistants in the Law Library. Legal Reference Services Quarterly, 26(1 2), 47 56. https://doi.org/10.1300/J113v26n01_04
[4]. Braun, V. & Clarke, V. (2006). Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2), pp.77に 101.
[5]. Halpin, H. (2004). The semantic web: The origins of artificial intelligence redux. Paper presented at the Third International Workshop on the History and Philosophy of Logic, Mathematics, and Computation (HPLMC 04 2005), Donostia San Sebastian, Spain.