Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396086
Chirag N. Modi, D. Patel, Avi Patel, R. Muttukrishnan
One of the major security issues in cloud computing is to protect against network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To address this issue, we design and integrate Bayesian Classifier and Snort based network intrusion detection system (NIDS) in Cloud. This framework aims to detect network intrusions in Cloud environment with low false positives and affordable computational cost. To ensure feasibility of our NIDS module in Cloud, we evaluate performance and quality results on KDD'99 experimental dataset.
{"title":"Bayesian Classifier and Snort based network intrusion detection system in cloud computing","authors":"Chirag N. Modi, D. Patel, Avi Patel, R. Muttukrishnan","doi":"10.1109/ICCCNT.2012.6396086","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396086","url":null,"abstract":"One of the major security issues in cloud computing is to protect against network intrusions that affect confidentiality, availability and integrity of Cloud resources and offered services. To address this issue, we design and integrate Bayesian Classifier and Snort based network intrusion detection system (NIDS) in Cloud. This framework aims to detect network intrusions in Cloud environment with low false positives and affordable computational cost. To ensure feasibility of our NIDS module in Cloud, we evaluate performance and quality results on KDD'99 experimental dataset.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"303 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116328986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396026
S. Sharma
In this paper, a novel Wang shape slotted microstrip patch antenna with high gain is presented and discussed. The proposed design offers low profile, very high gain and compact antenna element. The maximum gain is 12 dBi to 12.60 dBi from 1.82 GHz to 1.99GHz, antenna and radiation efficiency are more than 90% and bandwidth is 9% from 1.82GHz to 1.99GHz .The proposed design is suitable particular for wireless communication application such as WiFi and WLAN.
{"title":"Design of high gain Wang shape microstrip patch antenna for wireless system","authors":"S. Sharma","doi":"10.1109/ICCCNT.2012.6396026","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396026","url":null,"abstract":"In this paper, a novel Wang shape slotted microstrip patch antenna with high gain is presented and discussed. The proposed design offers low profile, very high gain and compact antenna element. The maximum gain is 12 dBi to 12.60 dBi from 1.82 GHz to 1.99GHz, antenna and radiation efficiency are more than 90% and bandwidth is 9% from 1.82GHz to 1.99GHz .The proposed design is suitable particular for wireless communication application such as WiFi and WLAN.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124805508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396060
P. Saktel, U. Shrawankar
Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.
{"title":"Context based domain identification for resolving ambiguity","authors":"P. Saktel, U. Shrawankar","doi":"10.1109/ICCCNT.2012.6396060","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396060","url":null,"abstract":"Context based Domain identification is a task of identifying correct domain of a word from the sentence. Domain identification is used to resolve ambiguity of words based on context of sentence. Context is a unique proof of meaning and its sentence. Hence, using this unique utility ambiguity is resolved. In this paper, the three stages are discussed which describes the previous and proposed work. This paper briefly focuses on second stage. The second stage describes the technique used to identify domain. After identification how the system is trained to select correct domain is explained. Lastly, the related results are shown. This paper describes usefulness of resolving ambiguity, which helps people to understand meaning of the sentence.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125010585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395894
S. Ali
Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes. In MANET nodes are self-motivated topologies can arbitrarily change their geographic locations. MANET consists of wireless links with considerable bandwidth. Packet delivery needs routing protocol to transmit a packet from source to destination. In such a network, nodes move, the established paths may break and the routing protocols must dynamically search for other feasible routes. Numerous protocols have been developed for mobile ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth and high error rates. These MANETs routing protocols are categorized in to Proactive Routing Protocols (PRP), Reactive Routing Protocols (RRP) and Hybrid Routing Protocols (HRP). This paper presents routing in wireless mobile ad-hoc networks using Destination Sequenced Distance Vector (DSDV) and Ad-hoc on demand Distance Vector (AODV) protocols. The performance of bandwidth, throughput and packet loss of DSDV and AODV has been modeled under various network configurations and mobility conditions. These mechanics can lead to significant performance differentials. The results are justified through NS-2 simulation.
{"title":"Enhanced route discovery in Mobile Adhoc Networks","authors":"S. Ali","doi":"10.1109/ICCCNT.2012.6395894","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395894","url":null,"abstract":"Mobile Adhoc Network (MANET) is a collection of wireless mobile nodes. In MANET nodes are self-motivated topologies can arbitrarily change their geographic locations. MANET consists of wireless links with considerable bandwidth. Packet delivery needs routing protocol to transmit a packet from source to destination. In such a network, nodes move, the established paths may break and the routing protocols must dynamically search for other feasible routes. Numerous protocols have been developed for mobile ad hoc mobile networks. Such protocols must deal with the typical limitations of these networks, which include high power consumption, low bandwidth and high error rates. These MANETs routing protocols are categorized in to Proactive Routing Protocols (PRP), Reactive Routing Protocols (RRP) and Hybrid Routing Protocols (HRP). This paper presents routing in wireless mobile ad-hoc networks using Destination Sequenced Distance Vector (DSDV) and Ad-hoc on demand Distance Vector (AODV) protocols. The performance of bandwidth, throughput and packet loss of DSDV and AODV has been modeled under various network configurations and mobility conditions. These mechanics can lead to significant performance differentials. The results are justified through NS-2 simulation.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128548015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6512437
K. A. Menon, D. P, M. Ramesh
Water is an important natural resource which needs constant quality monitoring for ensuring its safe use. This paper introduces a river water quality monitoring system based on wireless sensor network which helps in continuous and remote monitoring of the water quality data in India. The wireless sensor node in the system is designed for monitoring the pH of water, which is one of the main parameters that affect the quality of water. The proposed sensor node design mainly comprises of a signal conditioning module, processing module, wireless communication module and the power module. The sensed pH value will be wirelessly transmitted to the base station using Zigbee communication after the required signal conditioning and processing techniques. The circuit for the sensor node is designed, simulated and the hardware prototype is developed using the appropriate components which minimize the power requirement of the system and provides a cost effective platform for monitoring water quality.
{"title":"Wireless sensor network for river water quality monitoring in India","authors":"K. A. Menon, D. P, M. Ramesh","doi":"10.1109/ICCCNT.2012.6512437","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6512437","url":null,"abstract":"Water is an important natural resource which needs constant quality monitoring for ensuring its safe use. This paper introduces a river water quality monitoring system based on wireless sensor network which helps in continuous and remote monitoring of the water quality data in India. The wireless sensor node in the system is designed for monitoring the pH of water, which is one of the main parameters that affect the quality of water. The proposed sensor node design mainly comprises of a signal conditioning module, processing module, wireless communication module and the power module. The sensed pH value will be wirelessly transmitted to the base station using Zigbee communication after the required signal conditioning and processing techniques. The circuit for the sensor node is designed, simulated and the hardware prototype is developed using the appropriate components which minimize the power requirement of the system and provides a cost effective platform for monitoring water quality.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395865
S. Shukla, Rakesh Kumar Singh
Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.
{"title":"Security of cloud computing system using object oriented technique","authors":"S. Shukla, Rakesh Kumar Singh","doi":"10.1109/ICCCNT.2012.6395865","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395865","url":null,"abstract":"Cloud computing is a new emerging technology. It has been coming forth as an alternative computing environment where web-based services allow for different kinds of users to obtain a large variety of resources, such as software and hardware. Cloud Computing provides a way to share large amount of distributed resources belonging to different organizations through the internet, So it is prone to several types of security risks. Therefore a systematic methodology and process are indispensable to analyze security requirements. The Security policies should be developed for cloud computing systems at multiple levels to threats, risk and vulnerability. Here we discuss about a high order object oriented techniques and methods for construction of robust security policy to build cloud system more reliable and trustworthy.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127160858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396052
S. Kalyani, S. Nagalakshmi, R. Marisha
The main objective of Load Frequency Control (LFC) is to regulate the power output of the generator within an area in response to changes in system frequency and tie-line loading. LFC helps in maintaining the scheduled system frequency and tie-line power interchange with the other areas within the prescribed limits. The conventional controllers are slow and do not allow the controller designer to take into account possible changes in operating condition and non-linearities in the generator unit. When there is a variation in the load demand on a generating unit, there is a momenterial occurrence of unbalance between real power input and output. To compensate this power imbalance, an external Battery Energy Storage (BES) system is incorporated. Frequency oscillations due to large load disturbance can be effectively damped by fast acting energy storage devices such as Battery Energy Storage systems. The energy storage devices share the sudden changes in power requirement in the load. This paper presents the qualitative and quantitative comparison of conventional controllers and BES system in Load Frequency Control (LFC) of a typical two area interconnected power system. The superiority of the performance of BES over conventional controllers is highlighted and discussed in this paper.
{"title":"Load frequency control using battery energy storage system in interconnected power system","authors":"S. Kalyani, S. Nagalakshmi, R. Marisha","doi":"10.1109/ICCCNT.2012.6396052","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396052","url":null,"abstract":"The main objective of Load Frequency Control (LFC) is to regulate the power output of the generator within an area in response to changes in system frequency and tie-line loading. LFC helps in maintaining the scheduled system frequency and tie-line power interchange with the other areas within the prescribed limits. The conventional controllers are slow and do not allow the controller designer to take into account possible changes in operating condition and non-linearities in the generator unit. When there is a variation in the load demand on a generating unit, there is a momenterial occurrence of unbalance between real power input and output. To compensate this power imbalance, an external Battery Energy Storage (BES) system is incorporated. Frequency oscillations due to large load disturbance can be effectively damped by fast acting energy storage devices such as Battery Energy Storage systems. The energy storage devices share the sudden changes in power requirement in the load. This paper presents the qualitative and quantitative comparison of conventional controllers and BES system in Load Frequency Control (LFC) of a typical two area interconnected power system. The superiority of the performance of BES over conventional controllers is highlighted and discussed in this paper.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130534466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6396087
M. S. Akond, H. M. Masoudi
In this work, the Iterative Time Domain Beam Propagation Method (TD-BPM) has been implemented in the propagation of femtosecond pulsed beam inside two dimensional Y-junction. Being an implicit technique, it is free from Courant-Friedrichs-Lewy (CFL) stability criteria. Moreover, the mesh grid (Δx) and the propagation step (Δz) sizes are much more relaxed compared to the explicit one, such as the Finite Difference Time Domain (FDTD)technique. In order to verify the result, the FDTD has been implemented on the same problem and the result has been compared. The comparison shows a good agreement between the techniques.
{"title":"Iterative TD-BPM for modeling ultrashort pulse in z-variant optical structures","authors":"M. S. Akond, H. M. Masoudi","doi":"10.1109/ICCCNT.2012.6396087","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6396087","url":null,"abstract":"In this work, the Iterative Time Domain Beam Propagation Method (TD-BPM) has been implemented in the propagation of femtosecond pulsed beam inside two dimensional Y-junction. Being an implicit technique, it is free from Courant-Friedrichs-Lewy (CFL) stability criteria. Moreover, the mesh grid (Δx) and the propagation step (Δz) sizes are much more relaxed compared to the explicit one, such as the Finite Difference Time Domain (FDTD)technique. In order to verify the result, the FDTD has been implemented on the same problem and the result has been compared. The comparison shows a good agreement between the techniques.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130655511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395997
Y. Rathod, M. Chaudhari, G. Jethava
In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.
{"title":"Database intrusion detection by transaction signature","authors":"Y. Rathod, M. Chaudhari, G. Jethava","doi":"10.1109/ICCCNT.2012.6395997","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395997","url":null,"abstract":"In this paper we propose an approach for intrusion detection system for database management system .Our approach concentrate on security policies for transactions permitted with DBMS. Our approach is designed to mine audit log of legitimate transaction performed with database and generate signature for legal transactions as per security policy. The transactions not compliant to signature of valid transaction are identifies as malicious transaction. As security mechanism available with DBMS is not enough to detect intrusive actions, privilege users or unauthorized users executes malicious transaction to access crucial data. So security features can be enhancing by adding intrusive detection technology to Database management system.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969420","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2012-07-26DOI: 10.1109/ICCCNT.2012.6395996
R. Shobanasree, S. Radha, P. H. Rao
An Ultra Wideband (UWB) monopole antenna on a shaped ground plane is presented. This compact and thin antenna operates from 3.1 to 10.6 GHz. The radiating element is created by stitching the conductive thread instead of the copper metallization. The ground plane is created by using a Liquid Crystal Polymer (LCP)material(ε r=2.9). The substrate of the designed antenna is made from jeans fabric (ε r=1.7) while the radiating element is made from stainless steel coated conductive thread. By changing the shaped ground, the direction of the radiation pattern can be changed. Radiation pattern is steered over an angle of 60 degrees on the both the sides of beam pointing angle.
{"title":"Pattern reconfigurable Ultra Wideband thin antenna","authors":"R. Shobanasree, S. Radha, P. H. Rao","doi":"10.1109/ICCCNT.2012.6395996","DOIUrl":"https://doi.org/10.1109/ICCCNT.2012.6395996","url":null,"abstract":"An Ultra Wideband (UWB) monopole antenna on a shaped ground plane is presented. This compact and thin antenna operates from 3.1 to 10.6 GHz. The radiating element is created by stitching the conductive thread instead of the copper metallization. The ground plane is created by using a Liquid Crystal Polymer (LCP)material(ε r=2.9). The substrate of the designed antenna is made from jeans fabric (ε r=1.7) while the radiating element is made from stainless steel coated conductive thread. By changing the shaped ground, the direction of the radiation pattern can be changed. Radiation pattern is steered over an angle of 60 degrees on the both the sides of beam pointing angle.","PeriodicalId":364589,"journal":{"name":"2012 Third International Conference on Computing, Communication and Networking Technologies (ICCCNT'12)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125509113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}