{"title":"LOW EMISSION POWER GENERATION IN INDIA BY 2030","authors":"P. Umeshkannan","doi":"10.18000/IJISAC.50068","DOIUrl":"https://doi.org/10.18000/IJISAC.50068","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A MODIFIED LSB MATCHING STEGANOGRAPHY TECHNIQUE FOR IMAGES TO HIDE EXECUTABLE FILES","authors":"P. M. Kumar, K. L. Shunmuganathan","doi":"10.18000/IJISAC.50087","DOIUrl":"https://doi.org/10.18000/IJISAC.50087","url":null,"abstract":"Steganography is the science of hiding secret information in any cover data. It is mainly used for hidden communication between any people. The main aim of steganography concentrates on higher data payload ie., the maximum amount of secret data that can be hidden inside a particular cover media and the invisibility of the hidden data. This paper proposes a new algorithm for the same and the secret data we are hiding is an executable file.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ramamoorthy Subbureddiar, Srinivas Mukkamala, Madhu K. Shankarpani, A. Sung
{"title":"Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks","authors":"Ramamoorthy Subbureddiar, Srinivas Mukkamala, Madhu K. Shankarpani, A. Sung","doi":"10.18000/IJISAC.50010","DOIUrl":"https://doi.org/10.18000/IJISAC.50010","url":null,"abstract":"This paper concerns using learning machines for intrusion detection. Two classes of learning machines are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs for intrusion detection in three critical respects: SVMs train, and run, an order of magnitude faster; SVMs scale much better; and SVMs give higher classification accuracy. We also address the related issue of ranking the importance of input features, which is itself a problem of great interest in modeling. Since elimination of the insignificant and/or useless inputs leads to a simplification of the problem and possibly faster and more accurate detection, feature selection is very important in intrusion detection. Two methods for feature ranking are presented: the first one is independent of the modeling tool, while the second method is specific to SVMs. The two methods are applied to identify the important features in the 1999 DARPA intrusion data. It is shown that the two methods produce results that are largely consistent. We present various experimental results that indicate that SVM-based intrusion detection using a reduced number of features can deliver enhanced or comparable performance. An SVM-based IDS for class-specific detection is thereby proposed. Intrusion detection, Feature selection, Machine learning","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computing with Biological Models","authors":"R. Dare","doi":"10.18000/ijisac.50007","DOIUrl":"https://doi.org/10.18000/ijisac.50007","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"INTEGRATED APPROACH TO ECG SIGNAL PROCESSING","authors":"M. Kaur, Ubhi J.S, Birmohan Singh, Seema","doi":"10.18000/IJISAC.50085","DOIUrl":"https://doi.org/10.18000/IJISAC.50085","url":null,"abstract":"The Electrocardiogram (ECG) Signal is a graphical representation of the electromechanical activity of the cardiac system. It is one of the most important physiological parameter, which is being extensively used for knowing the state of cardiac patients. While taking ECG signals, the noises get introduced. It leads to the interference of these noises to important cardiac information. In order to get rid of these noises, an appropriate filter must be designed. This paper provides the design of cascading of IIR Bandpass Zero phase (BP-ZP) Elliptic filter, median filter and Elliptic notch filter. It helps to reduce Low frequency artifacts, High frequency artifacts, Baseline wander and Power line Interference to large extent. This reduction is shown by calculating Power Spectral Density (PSD) of signal before and after implementing above mentioned filters on ECG signal. The results have been concluded using Matlab and MIT-BIH Arrhythmia database.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129573042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DESIGN OF PID CONTROLLER FOR A LINEAR BRUSHLESS DC MOTOR USING SOFT COMPUTING TECHNIQUES","authors":"M. Belsamjebaananth, R. C.S, A. Prabha","doi":"10.18000/IJISAC.50097","DOIUrl":"https://doi.org/10.18000/IJISAC.50097","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK","authors":"S. Meenakshi, S. Srivatsa","doi":"10.18000/IJISAC.50051","DOIUrl":"https://doi.org/10.18000/IJISAC.50051","url":null,"abstract":"The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This has increased the need to protect the data and the resources from disclosure and to protect the entire network from network based attacks. There are many attacks intended to deprive legitimate users from accessing network resources and functions. Denial of service (DoS) attack is an attack on the availability of Internet services and resources. Flooding based distributed denial of service (DDOS) attack presents a very serious threat to the stability of the Internet. In spite of many intrusion detection mechanisms, many find it difficult to withstand against large scale attacks. We want to design a comprehensive mitigation mechanism against the DDoS attack. In this proposed system a comprehensive solution is given against the attack. In the proposed system the detection accuracy has been increased by varying the half-open connection lifetime. This work can be done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer Assisted Language Learning- An Essential Tool for The English Language Teachers","authors":"N. Manivannan, Shubhankar Mukherjee","doi":"10.18000/IJISAC.50014","DOIUrl":"https://doi.org/10.18000/IJISAC.50014","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"47 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IMPROVED TOTAL PRODUCTIVE MAINTENANCE USING LEAN PRINCIPLES IN AIRCRAFT MANUFACTURING AND MAINTENANCE","authors":"Kolanjiappan S, Maran K","doi":"10.18000/IJISAC.50074","DOIUrl":"https://doi.org/10.18000/IJISAC.50074","url":null,"abstract":"In the recent years the interest on improving aircraft manufacturing and maintenance methods to face the changing environments has become a prime research area. Total productive maintenance (TPM) development emerged as a result of these studies. TPM is an initiative for optimizing the reliability and effectiveness of manufacturing equipment. TPM is a team based proactive maintenance and involves at every level and function in the organization, from top executive to the shop floor. Parallel to this, Lean manufacturing introduced a massive paradigm shifting to production processes in different industries. Later lean aircraft maintenance development, a derived process from Lean manufacturing emerged. Despite its main focus on defect minimization, it was considered another facet of TPM. In this study we emphasize the key difference between the two practices and examine the possible improvements to the TPM from lean principles that ultimately would lead to a hybrid practice.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Improved Ad-Hoc on Demand Distance Vector Routing Protocol (SIm AODV)","authors":"B. Karthikeyan, S. Ganesh, N. Kanimozhi","doi":"10.18000/IJISAC.50164","DOIUrl":"https://doi.org/10.18000/IJISAC.50164","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}