As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.
{"title":"Quantifying the Impact of Flood Attack on Transport Layer Protocol","authors":"S. Tyagi","doi":"10.5121/IJCSA.2014.4607","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4607","url":null,"abstract":"As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"131 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Clinical Diagnosis of Parkinson’s disease [PD] leads to errors, excessive medical costs, and provide insufficient services to the patients. There is no particular method or a test to detect the PD. The diagnosis of the Parkinson’s disease needs an accurate detection. Computer Aided Diagnosis (CAD) gives accurate results to detect the PD. These CAD can be embedded into a real time application for the early diagnosis of PD. Dopamine nerve terminals can be reduced in the brain parts such as Substantia nigra, Striatum, and other brain structures. This reduction which will lead to Parkinson’s disease. Dopamine Reduction gets automatically diagnosed by CAD and PD/normal patients can be found. For this, machine learning system (MLS)/CAD can be trained with the help of Artificial Neural Networks (ANN). Image processing techniques that are available to detect PD using MLS/CAD gets discussed in this paper.
{"title":"Parkinsons Disease Diagnosis Using Image Processing Techniques A Survey","authors":"A. Valli, G. Jiji","doi":"10.5121/IJCSA.2014.4605","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4605","url":null,"abstract":"Clinical Diagnosis of Parkinson’s disease [PD] leads to errors, excessive medical costs, and provide insufficient services to the patients. There is no particular method or a test to detect the PD. The diagnosis of the Parkinson’s disease needs an accurate detection. Computer Aided Diagnosis (CAD) gives accurate results to detect the PD. These CAD can be embedded into a real time application for the early diagnosis of PD. Dopamine nerve terminals can be reduced in the brain parts such as Substantia nigra, Striatum, and other brain structures. This reduction which will lead to Parkinson’s disease. Dopamine Reduction gets automatically diagnosed by CAD and PD/normal patients can be found. For this, machine learning system (MLS)/CAD can be trained with the help of Artificial Neural Networks (ANN). Image processing techniques that are available to detect PD using MLS/CAD gets discussed in this paper.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"57-67"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79921124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Crime and violence are inherent in our political and social system. With the moving pace of technology, the popularity of internet grows continuously, with not only changing our views of life, but also changing the way crime takes place all over the world. We need a technology that can be used to bring justice to those who are responsible for conducting attacks on computer systems across the globe. In this paper, we present various measures being taken in order to control and deal with the crime related to digital devices. This paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.
{"title":"An Insight View of Digital Forensics","authors":"N. Kishore, Chetna Gupta, Dhvani Dawar","doi":"10.5121/IJCSA.2014.4608","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4608","url":null,"abstract":"Crime and violence are inherent in our political and social system. With the moving pace of technology, the popularity of internet grows continuously, with not only changing our views of life, but also changing the way crime takes place all over the world. We need a technology that can be used to bring justice to those who are responsible for conducting attacks on computer systems across the globe. In this paper, we present various measures being taken in order to control and deal with the crime related to digital devices. This paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classification of Retinal Vessels, Into Arteries And Veins - A Survey","authors":"S. Maheswari, Anandhi S.V","doi":"10.5121/IJCSA.2014.4606","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4606","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"35 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72585731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.14355/IJCSA.2014.0304.01
J. Kavitha, S. Palaniammal
In network, information apportioning occurs between one communication points to another using TCP protocol. The collected data are shared among many users via Single Router or Access Point (AP). During routing, traffic is occurred in the network and that is known as Random Early Detection (RED). In order to overcome this, an alternative path must be preferred by using Alternative Path Selection method which utilizes the Queue Process (FIFO). In case the queue is full, it chooses an alternative queue by using channel sensing mode of path selection. Here, we use OSPF (Open Shortest Path First) which selects the shortest path in short period of time and also it delivers the data to the particular destination. However, delay is reduced in OSPF. Hence, efficiency and overall network lifetime is increased. Finally, the network performance is evaluated.
在网络中,使用TCP协议在一个通信点与另一个通信点之间进行信息分配。收集的数据通过单个路由器或接入点(AP)在许多用户之间共享。在路由过程中,网络中发生流量,称为RED (Random Early Detection)。为了克服这一点,必须使用利用队列处理(FIFO)的备选路径选择方法来优选备选路径。在队列已满的情况下,采用路径选择的通道感知模式,选择一个备选队列。在这里,我们使用OSPF(开放最短路径优先),它在短时间内选择最短的路径,并将数据传递到特定的目的地。但是,OSPF可以减少延迟。因此,提高了效率和整体网络生命周期。最后,对网络性能进行了评估。
{"title":"Efficient Path Selection and Data Transmission Using Queue in Open Shortest Path First","authors":"J. Kavitha, S. Palaniammal","doi":"10.14355/IJCSA.2014.0304.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.01","url":null,"abstract":"In network, information apportioning occurs between one communication points to another using TCP protocol. The collected data are shared among many users via Single Router or Access Point (AP). During routing, traffic is occurred in the network and that is known as Random Early Detection (RED). In order to overcome this, an alternative path must be preferred by using Alternative Path Selection method which utilizes the Queue Process (FIFO). In case the queue is full, it chooses an alternative queue by using channel sensing mode of path selection. Here, we use OSPF (Open Shortest Path First) which selects the shortest path in short period of time and also it delivers the data to the particular destination. However, delay is reduced in OSPF. Hence, efficiency and overall network lifetime is increased. Finally, the network performance is evaluated.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"8 1","pages":"139"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75723235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2014-11-01DOI: 10.14355/IJCSA.2014.0304.02
S. Balakrishnan, Venkatalakshmi K, K. A
With the growth of Internet, there has been a tremendous increases in the number of attacks and therefore Intrusion Detection Systems (IDS’s) has become a main stream of information security. The purpose of IDS is to help the computer systems to deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from the normal behaviour to trigger during the occurrence of intrusions. Based on the source of data, IDS is classified into Host based IDS and Network based IDS. In network based IDS, the individual packets flowing through the network are analyzed where as in host based IDS the activities on the single computer or host are analyzed. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks effectively has been proposed and implemented. For this purpose, a new feature selection algorithm called Optimal Feature Selection algorithm based on Information Gain Ratio has been proposed and implemented. This feature selection algorithm selects optimal number of features from KDD Cup dataset. In addition, two classification techniques namely Support Vector Machine and Rule Based Classification have been used for effective classification of the data set. This system is very efficient in detecting DoS attacks and effectively reduces the false alarm rate. The proposed feature selection and classification algorithms enhance the performance of the IDS in detecting the attacks.
{"title":"Intrusion Detection System Using Feature Selection and Classification Technique","authors":"S. Balakrishnan, Venkatalakshmi K, K. A","doi":"10.14355/IJCSA.2014.0304.02","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.02","url":null,"abstract":"With the growth of Internet, there has been a tremendous increases in the number of attacks and therefore Intrusion Detection Systems (IDS’s) has become a main stream of information security. The purpose of IDS is to help the computer systems to deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from the normal behaviour to trigger during the occurrence of intrusions. Based on the source of data, IDS is classified into Host based IDS and Network based IDS. In network based IDS, the individual packets flowing through the network are analyzed where as in host based IDS the activities on the single computer or host are analyzed. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks effectively has been proposed and implemented. For this purpose, a new feature selection algorithm called Optimal Feature Selection algorithm based on Information Gain Ratio has been proposed and implemented. This feature selection algorithm selects optimal number of features from KDD Cup dataset. In addition, two classification techniques namely Support Vector Machine and Rule Based Classification have been used for effective classification of the data set. This system is very efficient in detecting DoS attacks and effectively reduces the false alarm rate. The proposed feature selection and classification algorithms enhance the performance of the IDS in detecting the attacks.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"145"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79742387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper based on recently introduced approach we formulated some recommendations to optimize manufacture drift bipolar transistor to decrease their dimensions and to decrease local overheats during functioning. The approach based on manufacture a heterostructure, doping required parts of the heterostructure by dopant diffusion or by ion implantation and optimization of annealing of dopant and/or radiation defects. The optimization gives us possibility to increase homogeneity of distributions of concentrations of dopants in emitter and collector and specific inhomogenous of concentration of dopant in base and at the same time to increase sharpness of p-n-junctions, which have been manufactured framework the transistor. We obtain dependences of optimal annealing time on several parameters. We also introduced an analytical approach to model nonlinear physical processes (such as massand heat transport) in inhomogenous media with time-varying parameters.
{"title":"An Approach to Decrease Dimensions of Drift Hetero-Bopolar Transistors","authors":"P. E.L, Bulaeva E.A","doi":"10.5121/IJCSA.2014.4503","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4503","url":null,"abstract":"In this paper based on recently introduced approach we formulated some recommendations to optimize manufacture drift bipolar transistor to decrease their dimensions and to decrease local overheats during functioning. The approach based on manufacture a heterostructure, doping required parts of the heterostructure by dopant diffusion or by ion implantation and optimization of annealing of dopant and/or radiation defects. The optimization gives us possibility to increase homogeneity of distributions of concentrations of dopants in emitter and collector and specific inhomogenous of concentration of dopant in base and at the same time to increase sharpness of p-n-junctions, which have been manufactured framework the transistor. We obtain dependences of optimal annealing time on several parameters. We also introduced an analytical approach to model nonlinear physical processes (such as massand heat transport) in inhomogenous media with time-varying parameters.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"98 1","pages":"25-51"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76452514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek
Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key ManagementReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network.
{"title":"Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents.","authors":"Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek","doi":"10.5121/IJCSA.2014.4508","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4508","url":null,"abstract":"Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key ManagementReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"95 1","pages":"99-112"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74969406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessment Of Wind Resource And Production In Oran, Algeria","authors":"Zakaria BOUZID, N. Ghellai, M. Belarbi","doi":"10.5121/IJCSA.2014.4504","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4504","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"54 1","pages":"53-60"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91110499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem
Taking advantage of state of the art underwater vehicles and current networking capabilities, the visionary double objective of this work is to “open to people connected to the Internet, an access to ocean depths anytime, anywhere.” Today, these people can just perceive the changing surface of the sea from the shores, but ignore almost everything on what is hidden. If they could explore seabed and become knowledgeable, they would get involved in finding alternative solutions for our vital terrestrial problems – pollution, climate changes, destruction of biodiversity and exhaustion of Earth resources. The second objective is to assist professionals of underwater world in performing their tasks by augmenting the perception of the scene and offering automated actions such as wildlife monitoring and counting. The introduction of Mixed Reality and Internet in aquatic activities constitutes a technological breakthrough when compared with the status of existing related technologies. Through Internet, anyone, anywhere, at any moment will be naturally able to dive in real-time using a Remote Operated Vehicle (ROV) in the most remarkable sites around the world. The heart of this work is focused on Mixed Reality. The main challenge is to reach real time display of digital video stream to web users, by mixing 3D entities (objects or pre-processed underwater terrain surfaces), with 2D videos of live images collected in real time by a teleoperated ROV.
{"title":"Distributed Mixed reality for diving and underwater tasks using Remotely Operated Vehicles","authors":"M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem","doi":"10.5121/ijcsa.2014.4501","DOIUrl":"https://doi.org/10.5121/ijcsa.2014.4501","url":null,"abstract":"Taking advantage of state of the art underwater vehicles and current networking capabilities, the \u0000visionary double objective of this work is to “open to people connected to the Internet, an access to \u0000ocean depths anytime, anywhere.” Today, these people can just perceive the changing surface of the sea \u0000from the shores, but ignore almost everything on what is hidden. If they could explore seabed and \u0000become knowledgeable, they would get involved in finding alternative solutions for our vital terrestrial \u0000problems – pollution, climate changes, destruction of biodiversity and exhaustion of Earth resources. \u0000The second objective is to assist professionals of underwater world in performing their tasks by \u0000augmenting the perception of the scene and offering automated actions such as wildlife monitoring and \u0000counting. The introduction of Mixed Reality and Internet in aquatic activities constitutes a technological \u0000breakthrough when compared with the status of existing related technologies. Through Internet, \u0000anyone, anywhere, at any moment will be naturally able to dive in real-time using a Remote Operated \u0000Vehicle (ROV) in the most remarkable sites around the world. The heart of this work is focused on \u0000Mixed Reality. The main challenge is to reach real time display of digital video stream to web users, by \u0000mixing 3D entities (objects or pre-processed underwater terrain surfaces), with 2D videos of live \u0000images collected in real time by a teleoperated ROV.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78593728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}