International Journal on Information Sciences and Computing最新文献

筛选
英文 中文
LOW EMISSION POWER GENERATION IN INDIA BY 2030 到2030年印度实现低排放发电
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50068
P. Umeshkannan
{"title":"LOW EMISSION POWER GENERATION IN INDIA BY 2030","authors":"P. Umeshkannan","doi":"10.18000/IJISAC.50068","DOIUrl":"https://doi.org/10.18000/IJISAC.50068","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124729399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A MODIFIED LSB MATCHING STEGANOGRAPHY TECHNIQUE FOR IMAGES TO HIDE EXECUTABLE FILES 一种用于图像隐藏可执行文件的改进LSB匹配隐写技术
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50087
P. M. Kumar, K. L. Shunmuganathan
{"title":"A MODIFIED LSB MATCHING STEGANOGRAPHY TECHNIQUE FOR IMAGES TO HIDE EXECUTABLE FILES","authors":"P. M. Kumar, K. L. Shunmuganathan","doi":"10.18000/IJISAC.50087","DOIUrl":"https://doi.org/10.18000/IJISAC.50087","url":null,"abstract":"Steganography is the science of hiding secret information in any cover data. It is mainly used for hidden communication between any people. The main aim of steganography concentrates on higher data payload ie., the maximum amount of secret data that can be hidden inside a particular cover media and the invisibility of the hidden data. This paper proposes a new algorithm for the same and the secret data we are hiding is an executable file.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122286917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks 基于支持向量机和神经网络的入侵检测系统审计数据挖掘
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50010
Ramamoorthy Subbureddiar, Srinivas Mukkamala, Madhu K. Shankarpani, A. Sung
{"title":"Mining Audit Data for Intrusion Detection Systems Using Support Vector Machines and Neural Networks","authors":"Ramamoorthy Subbureddiar, Srinivas Mukkamala, Madhu K. Shankarpani, A. Sung","doi":"10.18000/IJISAC.50010","DOIUrl":"https://doi.org/10.18000/IJISAC.50010","url":null,"abstract":"This paper concerns using learning machines for intrusion detection. Two classes of learning machines are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that SVMs are superior to ANNs for intrusion detection in three critical respects: SVMs train, and run, an order of magnitude faster; SVMs scale much better; and SVMs give higher classification accuracy. We also address the related issue of ranking the importance of input features, which is itself a problem of great interest in modeling. Since elimination of the insignificant and/or useless inputs leads to a simplification of the problem and possibly faster and more accurate detection, feature selection is very important in intrusion detection. Two methods for feature ranking are presented: the first one is independent of the modeling tool, while the second method is specific to SVMs. The two methods are applied to identify the important features in the 1999 DARPA intrusion data. It is shown that the two methods produce results that are largely consistent. We present various experimental results that indicate that SVM-based intrusion detection using a reduced number of features can deliver enhanced or comparable performance. An SVM-based IDS for class-specific detection is thereby proposed. Intrusion detection, Feature selection, Machine learning","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122428346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computing with Biological Models 生物模型计算
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/ijisac.50007
R. Dare
{"title":"Computing with Biological Models","authors":"R. Dare","doi":"10.18000/ijisac.50007","DOIUrl":"https://doi.org/10.18000/ijisac.50007","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117329533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTEGRATED APPROACH TO ECG SIGNAL PROCESSING 心电信号处理的综合方法
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50085
M. Kaur, Ubhi J.S, Birmohan Singh, Seema
{"title":"INTEGRATED APPROACH TO ECG SIGNAL PROCESSING","authors":"M. Kaur, Ubhi J.S, Birmohan Singh, Seema","doi":"10.18000/IJISAC.50085","DOIUrl":"https://doi.org/10.18000/IJISAC.50085","url":null,"abstract":"The Electrocardiogram (ECG) Signal is a graphical representation of the electromechanical activity of the cardiac system. It is one of the most important physiological parameter, which is being extensively used for knowing the state of cardiac patients. While taking ECG signals, the noises get introduced. It leads to the interference of these noises to important cardiac information. In order to get rid of these noises, an appropriate filter must be designed. This paper provides the design of cascading of IIR Bandpass Zero phase (BP-ZP) Elliptic filter, median filter and Elliptic notch filter. It helps to reduce Low frequency artifacts, High frequency artifacts, Baseline wander and Power line Interference to large extent. This reduction is shown by calculating Power Spectral Density (PSD) of signal before and after implementing above mentioned filters on ECG signal. The results have been concluded using Matlab and MIT-BIH Arrhythmia database.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129573042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DESIGN OF PID CONTROLLER FOR A LINEAR BRUSHLESS DC MOTOR USING SOFT COMPUTING TECHNIQUES 用软计算技术设计直线无刷直流电动机的pid控制器
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50097
M. Belsamjebaananth, R. C.S, A. Prabha
{"title":"DESIGN OF PID CONTROLLER FOR A LINEAR BRUSHLESS DC MOTOR USING SOFT COMPUTING TECHNIQUES","authors":"M. Belsamjebaananth, R. C.S, A. Prabha","doi":"10.18000/IJISAC.50097","DOIUrl":"https://doi.org/10.18000/IJISAC.50097","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126704389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK 半开连接生存时间在防御ddos攻击中的作用
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50051
S. Meenakshi, S. Srivatsa
{"title":"EFFECT OF HALF-OPEN CONNECTION LIFETIME IN DEFENDING AGAINST DDOS ATTACK","authors":"S. Meenakshi, S. Srivatsa","doi":"10.18000/IJISAC.50051","DOIUrl":"https://doi.org/10.18000/IJISAC.50051","url":null,"abstract":"The explosive growth in computer systems and their interconnections via networks has increased the dependence of both organizations and individuals on the information stored and communicated using these systems. This has increased the need to protect the data and the resources from disclosure and to protect the entire network from network based attacks. There are many attacks intended to deprive legitimate users from accessing network resources and functions. Denial of service (DoS) attack is an attack on the availability of Internet services and resources. Flooding based distributed denial of service (DDOS) attack presents a very serious threat to the stability of the Internet. In spite of many intrusion detection mechanisms, many find it difficult to withstand against large scale attacks. We want to design a comprehensive mitigation mechanism against the DDoS attack. In this proposed system a comprehensive solution is given against the attack. In the proposed system the detection accuracy has been increased by varying the half-open connection lifetime. This work can be done by using consensus algorithms for exchanging the information between the detection systems. So the overall detection time would be reduced for global decision making.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130678438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Assisted Language Learning- An Essential Tool for The English Language Teachers 计算机辅助语言学习——英语教师的必备工具
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50014
N. Manivannan, Shubhankar Mukherjee
{"title":"Computer Assisted Language Learning- An Essential Tool for The English Language Teachers","authors":"N. Manivannan, Shubhankar Mukherjee","doi":"10.18000/IJISAC.50014","DOIUrl":"https://doi.org/10.18000/IJISAC.50014","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"47 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121192135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IMPROVED TOTAL PRODUCTIVE MAINTENANCE USING LEAN PRINCIPLES IN AIRCRAFT MANUFACTURING AND MAINTENANCE 在飞机制造和维修中使用精益原则改进了全面的生产性维修
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50074
Kolanjiappan S, Maran K
{"title":"IMPROVED TOTAL PRODUCTIVE MAINTENANCE USING LEAN PRINCIPLES IN AIRCRAFT MANUFACTURING AND MAINTENANCE","authors":"Kolanjiappan S, Maran K","doi":"10.18000/IJISAC.50074","DOIUrl":"https://doi.org/10.18000/IJISAC.50074","url":null,"abstract":"In the recent years the interest on improving aircraft manufacturing and maintenance methods to face the changing environments has become a prime research area. Total productive maintenance (TPM) development emerged as a result of these studies. TPM is an initiative for optimizing the reliability and effectiveness of manufacturing equipment. TPM is a team based proactive maintenance and involves at every level and function in the organization, from top executive to the shop floor. Parallel to this, Lean manufacturing introduced a massive paradigm shifting to production processes in different industries. Later lean aircraft maintenance development, a derived process from Lean manufacturing emerged. Despite its main focus on defect minimization, it was considered another facet of TPM. In this study we emphasize the key difference between the two practices and examine the possible improvements to the TPM from lean principles that ultimately would lead to a hybrid practice.","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114872322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Improved Ad-Hoc on Demand Distance Vector Routing Protocol (SIm AODV) 安全性改进的Ad-Hoc按需距离矢量路由协议(SIm AODV)
International Journal on Information Sciences and Computing Pub Date : 1900-01-01 DOI: 10.18000/IJISAC.50164
B. Karthikeyan, S. Ganesh, N. Kanimozhi
{"title":"Security Improved Ad-Hoc on Demand Distance Vector Routing Protocol (SIm AODV)","authors":"B. Karthikeyan, S. Ganesh, N. Kanimozhi","doi":"10.18000/IJISAC.50164","DOIUrl":"https://doi.org/10.18000/IJISAC.50164","url":null,"abstract":"","PeriodicalId":121456,"journal":{"name":"International Journal on Information Sciences and Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115816756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信