Friday, 25 July 2014

Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Comprehensive Study of KDD99 Dataset and Data Mining Tools for Intrusion Detection

Author Name : Kamini Nalavade, Dr. B. B. Meshram

Synopsis :

Due to extensive growth of the Internet and increasing availability of tools and methods for intruding and attacking networks, intrusion detection has become a critical component of network security parameters. Intrusion detection in large data is one of the major challenge for the researchers in this area. Anomaly detection using data mining techniques has attracted the attention of many researchers to overcome the weakness of signature-based IDSs in detecting novel attacks and KDDCUP’99 is the mostly widely used data set for the evaluation of these systems. In this paper we have conducted an comprehensive study and statistical analysis on KDD dataset. We also provide description of features and instances of the dataset. The another important challenge for the researchers in this area is to select an appropriate data mining tool for the analysis. The paper disusses two important and popular tools in this area, weka, Oracle data mining and tanagara. We hope that study carried out in his paper is useful for the reasearcheres in the area of intrusion detection.


For more details:




Study of Web Page Rank algorithms

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Study of Web Page Rank algorithms

Author Name : Poonam Rawat, Deepak Pathak

Synopsis :

World Wide Web is growing every day, people searching for a information can be easily lost in the web. People use search engine to find relevant information from the web. So it is very challenging for search engine to find relevant and quality information from the huge collection of hyperlinked data on World Wide Web. This paper gives an introduction of web search engine with its architecture. It also describes web mining techniques and page ranking algorithm in detail. Some very important page ranking algorithms like PageRank algorithm, Weighted Pagerank algorithm and Hyperlink induced topic search (HITS) algorithm are discussed and Compared on the bases of various parameters like mining techniques, input parameter, working process, complexity, limitation and search engine using algorithm.



For more details:





Multimedia Information Systems: A Comparison Perspective of Social Web Sites

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Multimedia Information Systems: A Comparison Perspective of Social Web Sites

Author Name : Addala Radha Krishna, K. Chandra Sekharaiah

Synopsis :

In ISs, resource objects like databases are distributed and replicated in order to increase the performance, reliability and availability. In an earlier work, we extended the earlier existing taxonomy of ISs [10]. In this paper, we have revised the taxonomy further by including WIS, SWIS and MMIS. We shall discuss various characteristics of MMIS and the effect of the network on required quality of presentation for MMIS. MMIS input strings provide an efficient means for iconic temporal/spatial relations of media streams and semantic objects. Today more information sources become available as MMISs. Hence, the development of abstract semantic models for video, audio, text, graphics and image data became very important. In this paper, we have tabulated a comparison feature study of a variety of MMISs web sites. It is found that most of the modern web sites use maximum degree of multimedia support.



For more details:





Gender Classification Using Neck Features Extracted From Profile Images

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Gender Classification Using Neck Features Extracted From Profile Images

Author Name : Munehiro Nakamura, Kengo Iwata , Masatoshi Kimura , Haruhiko Kimura

Synopsis :

Gender classification has been one of the emerging issues in the field of security due to increase of women-only floors. For security purpose, this paper presents two biological features extracted from the neck region in a profile image. One is extracted the bump of the neck formed by the laryngeal prominence. Another is the width of the neck that tends to be wider in males than in females. Evaluation experiments for the proposed two features were performed on 50 male and 39 female profile images. The experimental result shows that the proposed method achieved over 95.0% accuracy for both of the male and female images, which overcomes a state-of-the-art method based on Local Binary Patterns for gender classification.



For more details:





Cross-Site Request Forgery: Vulnerabilities and Defenses

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Cross-Site Request Forgery: Vulnerabilities and Defenses

Author Name : Bharti Nagpal, Naresh Chauhan , Nanhay Singh

Synopsis :

Cross-Site Request Forgery (CSRF) attack occurs when a malicious web site causes a user’s web browser to perform an unwanted action on a trusted site. These attacks have been called the “sleeping giant” of web-based vulnerabilities, because many sites on the internet fail to protect against them because they have been largely ignored by the web development and security communities. The impact of a successful cross-site request forgery attack is limited to the capabilities exposed by the vulnerable application. This attack could result in a transfer of funds, changing a password, or purchasing an item in the user's context.



For more details:





Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet

Vol.3  No.2

Year: 2014

Issue : Mar-May

Title : Improving Performance of Web Applications with Effective Data Transmission Using Ids with Internet

Author Name : Kalai Magal R, M.Rames Kumar

Synopsis :

Depending upon who you ask, the IDS may be a simple audit trail process, or a filter process using a traffic control system, like screening routers, packet filters, firewalls, etc. Some people use IDS to mean a logging utility. This paper studies improving Internet security with Network Security combined authentication and intrusion detection (NS-IDS) secure data transmission in such MANETs. Security is deployed to work with intrusion detection systems (IDSs) to alleviate the shortcomings of uni-modal biometric systems. Since each device in the network has measurement and estimation limitations, more than one device needs to be chosen, and observations can be fused to increase observation accuracy using for the system decides whether user authentication (or IDS input) is required and which (or IDSs) should be chosen, depending on the security posture. The decisions are made Network in fully secured manner by each authentication device and IDS. Simulation results are presented to show the effectiveness of the proposed scheme.



For more details:





Friday, 4 July 2014

Review of Energy Aware policies for Cloud Computing Environment

Vol.3  No.1

Year: 2014

Issue : Dec-Feb

Title : Review of Energy Aware policies for Cloud Computing Environment

Author Name : Pankaj Singh, Binay Kumar Pandey , Hardwari Lal Mandoria , Ratnesh Srivastava

Synopsis :

With the rapid growth of cloud computing developers are being concern about the massive power consumption bythe data centers. The huge amount of power consume by the data centers does not only results in high operational cost but also the production of heat and carbon footprints on the environment. Researchers are making efforts to maximize the power efficiency and minimizing energy consumption of data centers. This paper presents a study of the researches and methods that have been proposed to increase the power efficiency and minimize power consumption of the data centers.



For more details:


Image Fusion Technique and Genetic Algorithm A Review

Vol.3  No.1

Year: 2014

Issue : Dec-Feb

Title : Image Fusion Technique and Genetic Algorithm A Review

Author Name : Deepak Awasthi, Richa Gupta

Synopsis :

Image fusion is technique in which two or more images of same scene are merged together such that new image formed suitable for better interpretation. Image fusion result into a fused image that continue to have the most useful information. This fused Image has characteristics of each input image. Various standard method used for image fusion produce good result spatially but cause spatial noise. To remove this distortion and enhance quality of fused image, various fusion schemes have been proposed. In this paper, we focus on the fusion methods based on various standard techniques and compare it with wavelet transform used for image fusion .Wavelet transform is majorly used in the area of image fusion because it provide better results in temporal domain as well as spatial domain .Performance of any fusion technique is measured by mean standard deviation, entropy, average gradient, peak signal to noise ratio (PSNR) and correlation coefficients.



For more details:

A System That Helps Sell/Buy Products with Ease

Vol.3  No.1

Year: 2014

Issue : Dec-Feb

Title : A System That Helps Sell/Buy Products with Ease

Author Name : Bheemanjaneyulu S, Dr.K.L.Narayana

Synopsis :

To get an idea of the modern gadgets that are available in the market and to select/ buy a product, a visit to the mall/ shop/ exhibition is needed till now. However, the products are now presented to the individual by online and he/ she need not take the trouble of going out. Recommender systems are alternative to search algorithms, as they help users discover item they might not have found by themselves. These systems use search engines indexing non-traditional data. Recommender systems are developed to get the pulse of the customer and to present the items, in which he/ she is interested and thus the manufacturer is able to sell his products and the customer is able to buy the items with less effort. Should it be also possible at this rate, using the recommender systems, to diagnose and prescribe the medicine to the ailing patient, to be experimented/ studied?



For more details:

Green Communication: Analysis and Development towards Energy Efficient Communication

Vol.3  No.1

Year: 2014

Issue : Dec-Feb

Title : Green Communication: Analysis and Development towards Energy Efficient Communication

Author Name : Sahil Pratap Singh, Yash Johri

Synopsis :

Information and Communications Technology (ICT) has changed our society remarkably in the last few years, one key feature is its great and continuously-increasing size. There seems no end in sight to the proliferation of mobile communications as over 120,000 new base stations are deployed yearly, and there is growth across every demographic from teenagers to businessmen to the poorest Indian village. The intersection of two undeniably increasing trends, escalating energy costs and meteoric growth in voice and data communications usage, creates an urgent need to address the development of more energy efficient ‘green’ communications. According to BCC Research, the ICT global market was worth $38.4 billion in 2010; the forecast is a growth to $58.4 billion and the downlink traffic from cellular handsets is expected to grow more than eight fold rising from 56MB per month to 455MB by 2015. This meteoric rise in users and data demand alone does not create a crisis; however when one evaluates the communications ecosystem from a carbon footprint and energy cost perspective, the results are startling. Although its effects on our everyday lives are obvious, the hazardous effects that this technology may have on the environment are much less clear and seldom talked about and are often neglected or overlooked. These impacts can be expressed throughout the lifecycle (from the manufacturing, use and disposal) of the ICT product. This paper presents a research vision for Green Communications. The core tenant of our Green Communications vision is to reduce overall energy consumption within framework of optimizing system capacity and maintaining user Quality of Service.



For more details:

Association Rule Mining Algorithm for Web Search Result Optimization: A Review

Vol.3  No.1

Year: 2014

Issue : Dec-Feb

Title : Association Rule Mining Algorithm for Web Search Result Optimization: A Review

Author Name : VINOD KUMAR YADAV, Dr. Anil Kumar Malviya, SATENDRA KUMAR

Synopsis :

The web is an enormous information space where a large number of an individual article or unit such as documents, images, videos or other multimedia can be retrieve. In this context, several information technologies have been developed to assist users to gratify their searching needs on web, and the most used by users are search engines as Yahoo, Google, Netscape, e-Bay, e-Trade, Expedia, Amazon, Bing, Ask, and so on. The search engines allow users to find web relevant resources by setting up their queries and reviewing a list of answers. In this paper a search result optimization method for search engine optimization by page rank updating, query recommendation and query reformulation are proposed. It explores the users queries registered in the search engine’s query logs in order to learn how users search and also in order to design algorithms that can improve the correctness of the answers suggested to users. The proposed method starts by exploring the query logs to find query clusters and identify session of queries then it examine query logs to discover useful relationship among pages, keywords and queries within clusters using association rule mining algorithms such as an apriori algorithm and automated apriori algorithm. We also showed that automated apriori algorithm generates more strong rules as compare to apriori algorithm.



For more details: