Int. J. Reason. based Intell. Syst.最新文献

筛选
英文 中文
An intelligent neuro-genetic framework for effective intrusion detection 一种有效入侵检测的智能神经遗传框架
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017500
K. Prabha, N. Jeyanthi
{"title":"An intelligent neuro-genetic framework for effective intrusion detection","authors":"K. Prabha, N. Jeyanthi","doi":"10.1504/IJRIS.2018.10017500","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017500","url":null,"abstract":"In this paper, a new intelligent neuro-genetic framework is proposed for detecting the intruders in networks by analysing their behaviour. For this purpose, a new genetic algorithm based feature selection algorithm (GAFSA) and a neuro-genetic fuzzy classification algorithm (NGFCA) have been proposed in this paper which are used to identify the malicious users through classification of user behaviours. The main advantage of this proposed framework is that it reduces the attacks by identifying the intruders with high accuracy and reduced false positive rate. This work has been tested through simulations and also using bench mark dataset for analysing the performance of the proposed algorithms. From the experiments conducted in this work using full features and selected features by applying the proposed classification algorithm, it is proved that the proposed framework detects the intruders more accurately and reduces the attacks leading to increase in packet delivery ratio and reduction in delay.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127392930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES] 无线传感器网络节能数据压缩和聚合技术[TELOSB MOTES]
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017499
B. Karthikeyan, R. Kumar, I. S. Rao
{"title":"Energy efficient data compression and aggregation technique for wireless sensor networks [TELOSB MOTES]","authors":"B. Karthikeyan, R. Kumar, I. S. Rao","doi":"10.1504/IJRIS.2018.10017499","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017499","url":null,"abstract":"This paper present and analyse an energy efficient data compression and data aggregation algorithm which results in the whole network lifetime prolonged by about 24%. In this paper, a new idea is proposed for sensor values compression based on a technique that involves feedback mechanism. In this technique, the base node in the sensor network generates Huffman code for the sensor data that needs to be compressed and broadcast the Huffman code in to the sensor network. All nodes in the sensor network receive Huffman code, compress the sensor data and transmit to base node. For data aggregation, secure data aggregation algorithm is used which does not necessitate additional phase for data integrity verification and also it eludes extra transmissions and computational overhead on the sensor nodes to reduce the amount of energy used up by the network. The whole idea was tested on TelosB sensor network platform, programmed in nesC language and also analyses the performance of the algorithm in the Contiki OS-simulator COOJA. A comparison is also done with existing compression algorithms in terms of lifetime of the sensor network.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121724750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Integrated cloud-based risk assessment model for continuous integration 集成的基于云的持续集成风险评估模型
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017516
K. Vijayakumar, A. Chokkalingam
{"title":"Integrated cloud-based risk assessment model for continuous integration","authors":"K. Vijayakumar, A. Chokkalingam","doi":"10.1504/IJRIS.2018.10017516","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017516","url":null,"abstract":"During the development stages of a software application or product there is a natural tendency to focus on the functional aspects rather than the architectural, security aspects. In the current age of changing dynamics in internet and mobility environments the risks in the areas of application being deployed and faces a critical security threat is very high. It's always better to prevent than react. With the advent of the technology and practices like continuous integration and develops are gaining importance it would be very meaningful for implementation of such framework as it would help in continuous risk assessment during the application development stages itself. This conference paper provides a novel framework through which can implement a continuous risk assessment approach on the software development projects for cloud-based scenarios.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123849133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography 基于椭圆曲线ElGamal加密的加密图像数据隐藏技术
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017511
R. Jayanthi, K. JohnSingh
{"title":"Encrypted image-based data hiding technique using elliptic curve ElGamal cryptography","authors":"R. Jayanthi, K. JohnSingh","doi":"10.1504/IJRIS.2018.10017511","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017511","url":null,"abstract":"Most of the data hiding techniques used RSA-basedencryption algorithms for encrypting the images and the messages. However, the security provided by elliptic key cryptography is higher with a lower size key than the RSA algorithm. Therefore, a new image encryption scheme which can be reversed during decryption is proposed in this paper which uses an elliptic curve key-basedElGamal encryption scheme for effective data hiding in images. Moreover, it uses the difference scheme available in the existing work for data hiding of images. From the experiments conducted in this work, it is proved that the proposed scheme is more efficient with respect to security and it reduces the computation complexity when it is compared with other related schemes.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130124617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient raindrop parameter estimation using image processing 一种基于图像处理的雨滴参数估计方法
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017513
P. Ghonge, K. Tuckley
{"title":"An efficient raindrop parameter estimation using image processing","authors":"P. Ghonge, K. Tuckley","doi":"10.1504/IJRIS.2018.10017513","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017513","url":null,"abstract":"Nowadays, image processing algorithms play a key role in the rain drop distribution estimation. This paper deals with number of drops and drop size distribution and its volume in particular time. We are using the raindrop image to calculate the amount of rainfall in a particular time. The proposed image processing based rain drop parameter estimation (IPRDPE) by using double-density dual-tree DWT (DDDT DWT) and thresholding based segmentation. By using effective image fusion technique, rain drop images from different angles are fused and using segmentation and morphological operations raindrop parameters estimated. To get better fused output max-based effective image fusion rules are used. The system using advanced image fusion technique and estimation for rain drop parameter, produce more accuracy and error free system compared to the existing techniques and also achieved better accuracy with respect to the real-time measurement.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130472703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grouping of users based on user navigation behaviour using supervised association rule tree mining 使用监督关联规则树挖掘基于用户导航行为的用户分组
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017514
R. GeethaRamani, P. Revathy, L. Balasubramanian
{"title":"Grouping of users based on user navigation behaviour using supervised association rule tree mining","authors":"R. GeethaRamani, P. Revathy, L. Balasubramanian","doi":"10.1504/IJRIS.2018.10017514","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017514","url":null,"abstract":"In this internet world, an increased interest of users in search of World Wide Web results in wide relevance of web mining, an application of data mining. Clustering has been widely used for web usage mining. Finding initial cluster center and specifying the number of clusters are the major challenges, which are overcome in this work by grouping of users based on the target class value. The benchmark dataset MSNBC is collected for the entire day of September 28, 1999. Supervised association rule tree mining is used to find frequent itemset for the targeted class value and thus generating 'if then rules'. Users are automatically clustered based on the rules satisfying the ground truth, resulting in 36 clusters in two iterations. The results revealed that the renowned clustering algorithms such as K-means takes 22 iterations for forming 36 clusters, wherein the proposed work generates 36 clusters in two iterations.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114468703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A novel feature extraction approach for tumour detection and classification of data based on hybrid SP classifier 一种基于混合SP分类器的肿瘤检测与分类特征提取新方法
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017502
N. G. Reddy, Roheet Bhatnagar
{"title":"A novel feature extraction approach for tumour detection and classification of data based on hybrid SP classifier","authors":"N. G. Reddy, Roheet Bhatnagar","doi":"10.1504/IJRIS.2018.10017502","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017502","url":null,"abstract":"This paper deals with identifying the cancer affected region of the brain. Many tools and techniques such as self-organising map (SOM), Proximal Support Vector Machine (PSVM) classifiers etc. exist to find out the cancer affected region in the brain. But the rapid growth in brain tumour cases in recent past indicates that the existing technologies have failed to identify its root cause as identification is a complex process and recent studies also reveal that different types of brain tumours can be treated either through surgery or in rare cases, with radiation. Image segmentation helps in identifying brain tumours, by calculating the volume and the growth of the tumours using techniques like human edge correction, outer edge colouring and interactive threshold holdings. In order to reduce the human error and to get the accurate results in MRI images there is an urgent need to find out an automatic or semi-automatic method for the classification of brain tumour images. The paper presents a 'hybrid SP' classifier and discusses its results in the detection and classification of brain cancer.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132362873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fuzzy logics associated with neural networks in intelligent control for better world 模糊逻辑与神经网络在智能控制中的应用
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/ijris.2018.10017517
G. A. Dalton, G. Reddy, K. Prasad
{"title":"Fuzzy logics associated with neural networks in intelligent control for better world","authors":"G. A. Dalton, G. Reddy, K. Prasad","doi":"10.1504/ijris.2018.10017517","DOIUrl":"https://doi.org/10.1504/ijris.2018.10017517","url":null,"abstract":"Nowadays, technology is growing wide spread with innovate thought. Day by day changes are being made to technology. A fast growing area in computer sciences is neural networks. Neural network is a computer system modelled on the human brain and human nervous system. Neural networks are sometimes referred to as an artificial human brain. Neural network is a subset of algorithms to construct artificial neurons. The human brain is transformed into plastic brain by neural networks. Neural networks are formed by interconnecting the number of information cells to process information. There is no guarantee that the system can work for all type of tasks. It may sometimes fail for certain tasks. To perform actions as humans, it is referred to as fuzzy logic. Today, fuzzy logic is an unprecedented popularity in technological and engineering fields. This topic teaches how computers can work as humans. This paper deals with fuzzy logic applications in the real world. Neural networks, computational intelligence techniques, intelligent control, instrument and robotics include fuzzy logics to perform the action in an easier way.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130049117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploiting ontology to map requirements derived from informal descriptions 利用本体来映射来源于非正式描述的需求
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017493
S. Murugesh, A. Jaya
{"title":"Exploiting ontology to map requirements derived from informal descriptions","authors":"S. Murugesh, A. Jaya","doi":"10.1504/IJRIS.2018.10017493","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017493","url":null,"abstract":"Requirements are narration of the services which a software system should make available along with the constraints that should be satisfied when the system operates. Software requirements have to be arrived from descriptions that are often incomplete, inconsistent, informal and ambiguous. Such informal descriptions have to be pre-processed and information constructs have to be extracted. This article deals with use of an ontology specific to automatic teller machine (ATM) operations domain that contains the concepts, the relationships that exists among the concepts and the focus is to decide on the feasibility of the requirement by mapping the extracted requirement with the requirement defined in the background ontology. The developed ontology is queried using simple protocol and RDF query language (SPARQL), if the derived requirement is present in the ontology it is said to be feasible; else decision may be taken to eliminate the requirements that are invalid and infeasible. Ontology is a formal specification of concepts with their attributes and relationship in a selected domain. As standard description formalism, the web ontology language (OWL) derived from resource description framework (RDF) is used.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129060526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FlowForensic: flow rule enforcement for control plane attacks in software defined networking FlowForensic:软件定义网络中控制平面攻击的流规则实施
Int. J. Reason. based Intell. Syst. Pub Date : 2018-11-30 DOI: 10.1504/IJRIS.2018.10017497
N. Sampath, C. Jayakumar
{"title":"FlowForensic: flow rule enforcement for control plane attacks in software defined networking","authors":"N. Sampath, C. Jayakumar","doi":"10.1504/IJRIS.2018.10017497","DOIUrl":"https://doi.org/10.1504/IJRIS.2018.10017497","url":null,"abstract":"Due to the lack of security in the traditional network, a new reprogrammable network called software defined networking has been introduced. It is a layered abstraction network with easy programmable, flexible and extensible by managing the networks by segregating the control plane from the data plane. This separation provides a way for developing more complex and advanced applications efficiently. OpenFlow is an interface between switches and controllers. It simplifies network management and programming of the network devices. The landscape of digital threats and cyber-attacks is evolving tremendously. The impact of various network attacks in software defined network environment is studied and implemented. The throughput results are compared and analysed between normal packet and spoofed packet. In accordance with the analysis of spoofed packet, rules are enforced for protection.","PeriodicalId":360794,"journal":{"name":"Int. J. Reason. based Intell. Syst.","volume":"222 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122605406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信