Volume-7 ~ Issue-1
- Citation
- Abstract
- Reference
- Full PDF
Keywords: Metaheuristic, neighbourhood, local search, neighbourhood search, hybridization.
pp. 487-499, 1994.
[2] T. A. Feo and M. G. C. Resende, A probabilistic heuristic for a computationally difficult set covering problem, Operational
Reseach Letters, 8 (1989), pp.67-71.
[3] T. A. Feo and M. G. C. Resende, Greedy randomized adaptive search procedures, Journal of Global Optimization, 6 (1995), pp.
1609-1624.
[4] T. A. Feo and M. G. C. Resende, GRASP: An annotated bibliography, Essays and Surveys in Metaheuristics, Kluwer Acadamic
Publishers, 2002.
[5] M. D. H. Gamal and Salhi, A cellular heuristic for the multisource Weber Prolem, computers & Operations Research, 30 (2003),
pp.1609-1624.
[6] B. Geothals and M. J. Zaki, Advances in Frequent Item set Mining Implementations: Introduction to FIMI03, Proceedings of the
IEEEICDM workshop on Frequent Item set Mining Implementations, 2003.
[7] G. Grahne and J. Zhu, Efficiently using prefix-trees in mining frequent item-sets, Proceedings of the IEEEICDM Workshop on
Frequent Itemset Mining Implementations, 2003.
[8] J. Han, J. Pei and Y. Yin, Mining frequent patterns without candidate generation, Proceedings of the ACMSIGMOD International
conference on Management of Data, pp. 1-12, 2000.
[9] J. Han and M. Kamber, Data Mining: Concepts and Techniques, 2nd Ed., Morgan Kaufman Publishers, 2006
[10] O. Kariv and L. Hakimi, An algorithmic approach to network location problems, part ii: the p-medians, SIAM Journal of Applied
Mathematics, 37 (1979), pp.539-560
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Establish and Operate A District-Level Disease Surveillance Unit |
Country | : | India |
Authors | : | Rajesh Kumar |
: | 10.9790/0661-0710609 | |
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Imprecise Software Requirements: A Software Development Risk |
Country | : | India |
Authors | : | Kirandeep Kaur , Rekha Rani , Bharti Jyoti |
: | 10.9790/0661-0711012 | |
Keywords:Software Engineering, Software Risk, Imprecise requirements.
[2] Prajakta Chandrakant Dhote, "Handling ambiguous data during requirements verification using fuzzy logic", International Journal
of Computer Science and Communication, Vol. 2, No. 1, pp: 105-107, 2011.
[3] Alexandre Bern, Satya Jaya Aparna Pasi, Uolevi Nikula, Kari Smolander., "Contextual Factors Affecting the Software Development
Process – An Initial View", pp:1-8.
[4] Abhijit Chakraborty, Mrinal Kanti Baowaly, Ashraful Arefin, Ali Newaz Bahar., " The Role of Requirement Engineering in
Software Development Life Cycle", Journal of Emerging Trends in Computing and Information Sciences, ISSN : 2079-8407 , Vol.
3, No. 5, pp: 723-729, 2012.
[5] Lachana Raimingwong, "A Review of requirements processes, Problem and models", International Journal of Engineering Science
and Technology (IJEST), ISSN: 0975-5462, Vol. 4, No.06, 2012.
[6] Subhash K.Shinde , Varunakshi Bhojane , Pranita Mahajan., "NLP based Object Oriented Analysis and Design from Requirement
Specification", International Journal of Computer Applications, ISSN:0975 – 8887, Vol. 47, No.21, 2012.
[7] Saima Amber, Narmeen Shawoo, Saira Begum., "Determination of Risk During Requirement Engineering Process", Journal of
Emerging Trends in Computing and Information Sciences, ISSN: 2079-8407, Vol. 3, NO. 3, pp: 358-364, 2012.
[8] Namrata Kapoor, Nitin Bhatia, Sangeet Kumar, "Software risk analysis using fuzzy logic", international journal of computer
information system , Vol. 2, No.2, 2011.
[9] Eric S. K. Yu and John Mylopoulos, "Understanding "Why" in Software Process Modelling, Analysis, and Design", 16th
International Conference Software Engineering, pp: 1-10, 1994.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Efficient Detection of Ddos Attacks by Entropy Variation |
Country | : | India |
Authors | : | V.Sus hma Reddy, K.Damodar Rao, P.Sowmya Laks hmi |
: | 10.9790/0661-0711318 | |
Keywords:DDOS, IPtraceback, Entropy Variation, Flows.
Proc.IEEE INFOCOM.
[2] S.Yu and W.Zhou, "Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks," Proc. Sixth Ann.
IEEEInt'l Conf. Pervasive Computing and Comm., pp. 566-571, 2008.
[3] Hoai-Vu Nguyen and Yongsun Choi," Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti-DDos
Framework"proc. IEEEINFOCOM 2010.
[4] Anusha. J,"Entropy Based Detection of DDOS Attacks"IJSEC-2011.
[5] G. Jin and J. Yang, "Deterministic Packet Marking Based on Redundant Decomposition for IP raceback," IEEE Comm. Letters,vol.
10, no. 3, pp. 204-206, Mar. 2006.
[6] K. Lu et al., "Robust and Efficient Detection of DDoS Attacks for Large-Scale Internet," Computer Networks, vol. 51, no. 9, pp.
5036-5056, 2007.
[7] R. Chen, J. Park, and R. Marchany, "A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks,"IEEE
Trans. Parallel and Distributed Systems, vol. 18, no. 5, pp. 577-588, May 2007.
[8] "IP Flow-Based Technology," ArborNetworks, http://www.arbornetworks.com, 2010.
[9] A. Belenky and N. Ansari, "IP Traceback with Deterministic Packet Marking," IEEE Comm. Letters, vol. 7, no. 4, pp. 162-164.
[10] M.T. Goodrich, "Probabilistic Packet Marking for Large-Scale IP Traceback," IEEE/ACM Trans. Networking.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:cryptographic protection in cloud computing, privacy in cloud computing, privacy protection with cryptographic technique in cloud computing
[2] CHAPPELL, D.2009. Introducing the Azure Services Platform. David Chappell & Associates.
[3] cloud computing http://www.wikinvest.com/concept/Cloud_Computing
[4] Dave Dittrich, Network monitoring/Intrusion Detection Systems (IDS), University of Washington
[5] M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A Concrete Security Treatment of Symmetric Encryption: Analysis of the DES
Modes of Operation. Proceedings of the 38th Symposium on Foundations of Computer Science, IEEE, 1997.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:Fuzzy Clustering, AFMR, SAFMR, CBRP, Kalman Filter, Location Management.
[1] Shekhar H M P, Arun Kumar M A, and K S Ramanatha,(2005) ―Mobile agents aided multicast routing in mobile ad hoc networks‖ Advanced Communication Technology, 2005, ICACT 2005.
[2] Zaiba Ishrat, (2011) ‖ Security issues, challenges & solution in MANET‖ in International Journal of Computer Sci ence & Technology Vol. 2, Iss ue 4, Oct . - Dec. 2011
[3] R. Pandi Selvam and V.Palanisamy, (2011) ―AN EFFICIENT CLUSTER BASED APPROACH FOR MULTI-SOURCE MULTICAST ROUTING PROTOCOL IN MOBILE AD HOC NETWORKS‖ International Journal of Computer Networks & Communications (IJCNC) Vol.3, No.1, January 2011
[4] XUE-MEI SUN, WEN-JU LIU, ZHI-QIANG ZHANG and YOU ZHAO,(2006) ―CODMRP: Cluster-based On Demand Multicast Routing Protocol ―Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006
[5] XUE-MEI SUN, WEN-JU LIU, ZHI-QIANG ZHANG and YOU ZHAO,(2006)‖ CODMRP: Cluster-based On Demand Multicast Routing Protocol‖ Wireless Communications, Networking and Mobile Computing, 2006. WiCOM 2006.
[6] Bey-Ling Su, Ming-Shi Wang and Yueh-Ming Huang,(2008) ―Fuzzy logic weighted multi-criteria of dynamic route lifetime for reliable multicast routing in ad hoc networks‖ Expert Systems with Applications: An International Journal Volume 35 Issue 1-2, July, 2008
[7] Muhammad Arshad Ali and Yasir Sarwar,(2011) ―Security Issues regarding MANET (Mobile Ad Hoc Networks): Challenges and Solutions‖ in School of Computing, Blekinge Institute of Technology March 2011
[8] Roberto Carlos Hincapi, Blanca Alicia Correa and Laura Ospina,(2006) ―Survey on Clustering Techniques for Mobile Ad Hoc Networks‖ January 20, 2006; revised April 18, 2006.
[9] Jing Nie, JiangchuaWen, Ji Luo, Xin He and Zheng Zhou, (2006) ―An adaptive fuzzy logic based secure routing protocol in mobile ad hoc networks‖ on Fuzzy Sets and Systems Volume 157, Issue 12, 16 June 2006.
[10] Rui Huang and Gergely V. Z aruba,(2006) ―Location Tracking in Mobile Ad Hoc Networks using Particle Filter‖ Journal of Discrete Algorithms Volume 5 Issue 3, September, 2007..
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Optimization of Emergency Response System Using Cellular Network |
Country | : | India |
Authors | : | Prof. Prina Shah, Prof. Zunnun Narmawala |
: | 10.9790/0661-0713339 | |
Keywords:Emergency Response System, Ad hoc networks, Localization, GPS, Cellular Network
[2] E. F. N. A. A. L. Azzedine Boukerche, Horacio A.B.F. Oliveira, "Vehicular ad hoc networks: A new challenge for localization-based
systems," in Science Direct, 2008.
[3] M. I. Silventoinen and T. Rantalainen, "Mobile station emergency locating in gsm," in IEEE Personal Wireless Communications,
pp. 232 – 238, 1996.
[4] A. V. Emiliano Trevisani, "Cell-id location technique, limits and benefits: an experimental study," in IEEE Mobile Computing
Systems and Applications, pp.51 – 60, December 2004.
[5] M. M. Christopher Drane and C. Scott, "Positioning gsm telephones," in IEEE Communications magazine, pp. 46 – 54,59, 1998.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Security Improvement of Xml Files Using Structure Modification |
Country | : | India |
Authors | : | Daxesh Panchal, Prof A.S. Dhabariya |
: | 10.9790/0661-0714046 | |
Keywords:Security, XML, Web services, SOA, distributed systems
Recommendation, 2008.
[2] D. Eastlake and J. Reagle, "XML Encryption Syntax and Processing," W3C Recommendation, 2002.
[3] XML Security by Claudio A. Ardagna, Ernesto Damiani, Sabrina De Capitani di Vimercati, and Pierangela Samarati.
[4] XML and Web Services Security Standards Nils Agne Nordbotten.
[5] http://www.w3.org/TR/xmlenc-core/#sec-Algorithms.
[6] A Stream-based Implementation of XML Encryption by Takeshi Imamura, Andy Clark, Hiroshi Maruyama.
[7] http://msdn.microsoft.com/en-us/library/windows/desktop/ms762271(v=vs.85).aspx
http://www.xml.com/pub/a/2001/08/08/xmldsig.html
[8] Understanding Web Services: XML, WSDL, SOAP, and UDDI. By Newcomer, E.
- Citation
- Abstract
- Reference
- Full PDF
Keywords:Digital Signature, Block cipher, Factorization, MD5, ECC.
[1] Mr. Hemant Kumar, Dr.Ajit Singh, An Efficient Implementation of Digital Signature Algorithm with SRNN Public Key
Cryptography, IJRREST, June 2012.
[2] Aqeel Khalique, Kuldip Singh Sandeep Sood, Implementation of Elliptic Curve Digital Signature Algorithm, International
Journal of Computer Applications, May 2010.
[3] Sushila Vishnoi, Vishal Shrivastava, International Journal of Computer Trends and Technology, ISSN: 2231-2803, 2012.
[4] W.Diffie and M. E. Hellman, New directions in cryptography, IEEE Transactions on information theory, vol.22,1976.
Books:
[5] Douglas Stinson, Cryptography Theory and Practice, by CRC Press, 1995.
[6] A. J. Menezes, P.C.V. Oorschot and S. A. Vanstone, Handbook of applied cryptography, CRC Press, 1996.
Proceedings Papers:
[7] P. Kitsos, N. Sklavos, and O. Koufopavlou, An efficient implementation of the digital signature algorithm, Electronics, Circuits
and Systems, 2002.
[8] W.C.Cheng, C.-F.Chou and L.Golubchik, Performance of Batch-based Digital Signatures , 10th IEEE International Symposium
on Modeling, 2002.
[9] S. Even, O. Goldreich, and S. Micali, On-line/off-line digital signatures, presented at Proceedings of CRYPTO‟89 conference,
1990.
[10] R.Gennaro and P.Rohatgi, How to sign digital streams, presented at Proceedings of CRYPTO'97, Santa Barbara, CA, 1997.