D. Kshirsagar, Sachin S. Sale, Dinesh K. Tagad, Ganpat Khandagale
{"title":"Network Intrusion Detection based on attack pattern","authors":"D. Kshirsagar, Sachin S. Sale, Dinesh K. Tagad, Ganpat Khandagale","doi":"10.1109/ICECTECH.2011.5942003","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942003","url":null,"abstract":"Intrusion Detection system becomes the one of the favorite research topic due to its capability of detecting various network attacks. There are many works done in the field of intrusion detection up till now. In this paper we are proposing the pattern based Intrusion Detection model. This system is based on CIDF architecture. The Pattern based Intrusion Detection model consist of five modules: Capture Module, Decode Module, Detection Module, Known Attack Pattern Module and Action Module. A pattern based IDS monitor packets on the network and compares them against a database of known attack pattern of malicious threats. Our paper focuses on the packet sniffer and its working, various attacks on network as an intrusion and their detection using pattern based IDS.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125555157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prevention of sleep deprivation attacks using clustering","authors":"M. Sarkar, D. Roy","doi":"10.1109/ICECTECH.2011.5942027","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942027","url":null,"abstract":"MANETs are highly vulnerable to attacks due to the open medium dynamically changing network topology, cooperative algorithm, lack of centralized monitoring and management point. The fact that security is a critical problem in implementing mobile ad hoc networks (MANETs) is widely acknowledged. One of the different kinds of misbehavior a node may exhibit is exhausting a node by consuming its battery power. Routing protocol plays a crucial role for effective communication between mobile nodes and operates on the basic assumption that nodes are fully cooperative. Because of open structure and limited battery-based energy some nodes may not cooperate correctly. In this paper an algorithm is proposed to prevent sleep deprivation attack. The proposed algorithm is based on clustering mechanism.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121595781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient feature selection method for classification in health care systems using machine learning techniques","authors":"K. Selvakuberan, D. Kayathiri, B. Harini, I. Devi","doi":"10.1109/ICECTECH.2011.5941891","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941891","url":null,"abstract":"Data mining can be used for a large amount of applications. Among one is the health care systems. Usually, medical databases have large quantities of data about patients and their medical history. Analyzing this voluminous data manually is impossible. But this medical data contain very useful and valuable information which may save many lives if analyzed and utilized properly. Data mining technology is very effective for Health Care applications for identifying patterns and deriving useful information from these databases. Diabetes is one of the major causes of premature illness and death worldwide. In developing countries, less than half of people with diabetes are diagnosed. Without timely diagnoses and adequate treatment, complications and morbidity from diabetes rise exponentially. India has the world's largest diabetes population, followed by China with 43.2 million. This paper describes about the application of data mining techniques for the detection of diabetes in PIMA Indian Diabetes Dataset (PIDD). In this paper we propose a Feature Selection approach using a combination of Ranker Search method. The classification accuracy of 81% resulted from our approach proves to be higher when compared with previous results","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125915402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of radar topology networks to evolve the electronic warfare survivability metrics","authors":"Namrita Waghray, P. M. Menghal","doi":"10.1109/ICECTECH.2011.5941622","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941622","url":null,"abstract":"Electronic warfare is a military action whose objective is to control the electromagnetic spectrum. To accomplish this objective, both offensive electronic attack (EA) and electronic protection (EP) actions are required. In addition electronic warfare support (ES) actions are essential to supply the intelligence and threat recognition that allow implementation of both EA and EP. Commanders must prepare to operate weapons systems in an intensive and non-permissive electromagnetic environment. Mission accomplishment requires awareness, dynamic planning, and flexibility at all levels of war. The Information System is a rescue in this critical task. It has been proposed to develop the EW Intelligent Information System that deals with processing of electronic warfare, communications, radar, war missions etc. In this work, design and implementation of such an intelligent system is offered. Using artificial intelligence, this system aims at achieving the best performance with a friendly system in spite of the existence of hostile actions. This system deals with different sources of data. It helps visualize mission scenarios, decides the mission suitability and the best EA and ES methods accordingly. This work handles a nonlinear optimization problem with multiple variables and constraints. Closed form and exact solutions of such problems are computationally difficult. Therefore, the paper proposes the use of artificial intelligence mainly the fuzzy logic and neural networks approach to tackle this problem. Traditionally, large databases of information require complex problem solving techniques. However, the use of AI provides a simple yet computationally manageable solution for this issue.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126031318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Divyesh Ginoya, Tejash R. Patel, P. Shendge, S. Phadke
{"title":"Design and hardware implementation of model following sliding mode control with inertial delay observer for uncertain systems","authors":"Divyesh Ginoya, Tejash R. Patel, P. Shendge, S. Phadke","doi":"10.1109/ICECTECH.2011.5941829","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941829","url":null,"abstract":"This paper proposes the design and implementation of model following sliding mode control strategy based on an inertial delay observer. This observer estimates the states as well as the uncertainties and disturbances in an integrated manner. It is shown that when modeling uncertainties and disturbances are present in the system, it gives better results compared with classical proportional observer. Lastly, the proposed approach is validated through experimentation on Quanser's servo plant SRV-02. Results show the effectiveness of the combination the controller-observer designed using inertial delay observer.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116078640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving Vehicle Routing and scheduling problems using hybrid genetic algorithm","authors":"Bhawna Minocha, Saswati Tripathi, C. Mohan","doi":"10.1109/ICECTECH.2011.5941682","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941682","url":null,"abstract":"Vehicle Routing Problem with Time windows (VRPTW) is an example of scheduling in constrained environment. It is a well known NP hard combinatorial scheduling optimization problem in which minimum number of routes have to be determined to serve all the customers within their specified time windows. So far different analytic and heuristic approaches have been tried to solve such problems. In this paper we proposed an algorithm which incorporates a new local search technique with genetic algorithm approach to solve VRPTW scheduling problems in various scenarios.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116212730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. K. Megalingam, Ramesh Nammily Nair, Sai Manoj Prakhya, Mithun Mohan
{"title":"Low power, intelligent, wireless, home security system for the elderly people","authors":"R. K. Megalingam, Ramesh Nammily Nair, Sai Manoj Prakhya, Mithun Mohan","doi":"10.1109/ICECTECH.2011.5941912","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941912","url":null,"abstract":"In this paper, we suggest a Low Power Intelligent, Wireless, Home Security System (IWHSS) for Elders. The elders can avail the services of this IWHSS, conveniently within their room. If the elder is uncomfortable with a stranger trying to get into the home, services of IWHSS can be availed. The strangers can be identified and in emergency situations where the elder feels the necessity of the external help, the police and relatives can be informed via IWHSS. In addition to informing the police, the system also activates an emergency alarm to alert the neighbors. The elders can also see the stranger at the door and make a conversation with them. The system uses GPRS Modem which is interfaced directly with PIC 16F877A microcontroller to make the system power efficient. We have used low cost RF modules, PIC 16F877A microcontroller, IR-TSOP modules and Image Capture module as part of the hardware implementation of the system. The simulation software's used were MPLAB IDE and PROTEUS.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123745023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Human recognition through RFID: A distinct application of speech processing","authors":"Nilu Mishra, Archana Charkhawala","doi":"10.1109/ICECTECH.2011.5941938","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5941938","url":null,"abstract":"This paper presents a distinct application of Speech recognition. It is indistinct application of speaker and speech recognition. This enables a low cost recognition system with digital communication concept which reduces computation complexity. The proposed method can detect the human easily and quickly compared with the other methods. The proposed method is just the plan of action used to recognize person on basis of speech The human vocal sound is in the range of 30–1100Hz which a low audio frequency, so for this we require a passive transducer(passive RFID System) which give each voice frequency a tag which is responsible for human recognition. The passive voice enabled RFID devices include a power harvesting circuit that converts natural and artificial energy sources to voltage and current to power the device, thus, the device does not require a battery. It provides a voice capable RFID device with a power harvesting circuit that is powered by harvesting energy from various artificial or energy sources and/or natural energy sources such as: voice signals, other electromagnetic waves, sun light, vibrations, RF noise, etc. and used voice signals received to uniquely identify a generator of the voice signals or other sound signals.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124985780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"View divergence of freshness in replicated database systems: A review","authors":"A. Singhal, Rohit Kumar, Sumeet Kumar Sinha","doi":"10.1109/ICECTECH.2011.5942125","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942125","url":null,"abstract":"Data replication is often used in distributed database applications to improve database availability and performance. Replicated database must be periodically refreshed using update propagation strategies. The concept of freshness is used to measure the deviation between replica copies. In this paper, we analyze the different methods to control the view divergence of data freshness for clients in replicated database systems whose facilitating or administrative roles are equal. The methods, mentioned in this paper, provide data to clients with freshness specified by them when updates are initially accepted by any of the replicas, and then, asynchronously propagated among the replicas. To provide data with statistically defined freshness, we select multiple replicas using a distributed algorithm and centralized algorithm so that they receive all updates issued up to a specified time before the present time. We compared the view divergence control of both methods in terms of controlled data freshness, time, message, and computation complexity. The comparison showed that distributed method achieves a great improvement in data freshness compared with centralized method.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"197 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113967055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of a single server retrial queue with general retrial times, two phases of service, balking and Bernoulli vacation","authors":"D. Arivudainambi, P. Godhandaraman","doi":"10.1109/ICECTECH.2011.5942041","DOIUrl":"https://doi.org/10.1109/ICECTECH.2011.5942041","url":null,"abstract":"In this paper, we introduce a single server retrial queue with general retrial times, two phases of service, balking and Bernoulli vacation. We assume that the arriving customers who find the server busy are queued in the orbit in accordance with an first come first served (FCFS) discipline and only the customer at the head of the queue is allowed for access to the server or balk the system. After the completion of first phase service, the customer compulsory join the second phase of service. If the orbit is empty, the server always takes a vacation. At the end of the vacation, the server waits for the customer to arrive. The steady state distribution of the server state and the number of customers in the system are obtained. The effects of various parameters on the system performance are analyzed.","PeriodicalId":184011,"journal":{"name":"2011 3rd International Conference on Electronics Computer Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122688877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}