{"title":"Novel architecture for cluster based service Discovery and load balancing in Mobile Ad hoc Network","authors":"M. Buvana, M. Suganthi, K. Muthumayil","doi":"10.1109/ICOAC.2011.6165191","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165191","url":null,"abstract":"A Mobile Ad hoc Network (MANET) is a collection of two or more mobile devices (PDA, laptop, cellphones, etc.) it is getting more and more important for mobile users to discover resources (eg: Printer, fax machines) without any need of configuration. To this end service discovery is an important feature of MANET. In this paper we propose a novel architecture that the cluster based service Discovery, leads to high degree of stability in the network and improves the load balancing. Its performance is studied under packet delivery ratio, Discovery Time, Energy consumption, load.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131876989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Web service recommendation framework using QoS based discovery and ranking process","authors":"R. Jeberson, R. Raj, T Sasipraba","doi":"10.1109/ICOAC.2011.6165204","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165204","url":null,"abstract":"Locating the desired web service to a client requirement is an onerous task as many web services are ready to satisfy a request. Recommending the pertinent web service and not providing the unwarranted service are the two main issues to be addressed in web service selection process. The limitation of keyword search is that it doesn't articulate the client request accurately. Current search engines and UDDI are based on keyword search, which is inherently impractical for providing the right service to the client. Since the keyword search is unable to grasp the underlying semantics of the searched query, web services discovery based on input and output operation has been introduced. Though the operation based search returns relevant result, still the returned result is not ranked based on performance of web services. So the search mechanism must be incorporated with the QoS requirements will augment to complete the selection process. Therefore, QoS aware web service discovery based on input and output operation has been introduced. In this approach, QoSConsultant acts as a broker between client and service provider. The QoS attributes are normalized, and the match score value is stored in the Service pool. The WSDLParser extracts the input/output operation from the WSDL file and stores it in the service pool. Whenever a search is performed for a given input/output operation, the consultant selects a list of candidate services that are matched with the given request will be provided to the client for setting weights over QoS attributes. The highest degree of the matched web service will be provided to the client for invocation process. The system has been tested with real and synthetic data which shows propitious result.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Subbulakshmi, Dr. S. Mercy Shalinie, V. GanapathiSubramanian
{"title":"Detection of DDoS attacks using Enhanced Support Vector Machines with real time generated dataset","authors":"T. Subbulakshmi, Dr. S. Mercy Shalinie, V. GanapathiSubramanian","doi":"10.1109/ICOAC.2011.6165212","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165212","url":null,"abstract":"An approach for combating network intrusion detection is the development of systems applying machine learning and data mining techniques. Many Intrusion Detection Systems (IDS) suffer from a high rate of false alarms and missed intrusions. The detection rate has to be improved while maintaining low rate of misses. The focus of this paper is to generate the Distributed Denial of Service (DDoS) detection dataset and detect them using the Enhanced Support Vector Machines. The DDoS dataset with various direct and derived attributes is generated in an experimental testbed which has 14 attributes and 10 types of latest DDoS attack classes. Using the generated DDoS dataset the Enhanced Multi Class Support Vector Machines (EMCSVM) is used for detection of the attacks into various classes. The performance of the EMCSVM is evaluated over SVM with various parameter values and kernel functions. It is inferred that EMCSVM produces better classification rate for the DDoS dataset with ten types of latest DDoS attacks when compared with the kddcup 99 dataset which has six types of DoS attacks.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131202743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Valliyammai, S. Selvi, T. Amarnath, B. Kumar, S. Siva
{"title":"Countermeasures to threats from agent platform and malicious code check using dynamic policy file","authors":"C. Valliyammai, S. Selvi, T. Amarnath, B. Kumar, S. Siva","doi":"10.1109/ICOAC.2011.6165206","DOIUrl":"https://doi.org/10.1109/ICOAC.2011.6165206","url":null,"abstract":"Mobile agents are autonomous programs that can migrate from one computer host to various hosts and resumes its execution in the remote hosts. Mobile agents are mainly used in distributed environments like Grid. Mobile agents are mostly used in e-commerce applications. The main objective of the proposed system helps in identifying and preventing various types of security threats that occurs in the mobile agent environment. The system provides an efficient and reliable attack detection and prevention process which plays a vital role for the reliable working of the mobile agent system. Distributed environments having heterogeneous architecture being geographically distributed and interconnected via unreliable network media are at the risk of various security threats. A distributed environment consists of unreliable resources therefore security mechanisms cannot be ignored and an efficient security framework is needed. These security threats have to be dealt at the right time so as to increase the computational power of the mobile agent environment.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123689507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"VC message","authors":"","doi":"10.1109/icoac.2011.6165239","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165239","url":null,"abstract":"","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130609976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dean message","authors":"Thamarai Selvi, S. Selvi","doi":"10.1109/icoac.2011.6165226","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165226","url":null,"abstract":"It is inspiring to note that this International Conference is the firs'! one organized after the bloom of the Department of Computer Technology, MIT Campus, Anna University, Chennai. I am sure ICoAC 2011, will take international researchers together to present their ground-breaking ideas, thrash out the current issues, exchange ideas and disseminate information in the hottest research areas ofadvanced computing not only in India but also abroad, which keeps the educational universities and industries abreast.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Convenor messages","authors":"","doi":"10.1109/icoac.2011.6165221","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165221","url":null,"abstract":"December 2011, with the participation of distinguished people, delegates and representatives of esteemed international organizations and renowned IT experts globally. The ever growing demand and the need for rapidly changing and Advanced Computing or technologies will be viewed from several different perspectives. This third International Conference on Advanced Computing (ICoAC) 2011 is aimed to provide a forum for demonstrating the latest research fmdings and exchanging ideas of research, development, and knowledge among the different research groups and faculties of the department. This conference represents a unique opportunity for meeting colleagues and friends, exchanging the organizing committee, who did very active and endless work and put tremendous effort into the conference.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130679396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programme schedule day 3","authors":"","doi":"10.1109/icoac.2011.6165225","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165225","url":null,"abstract":"","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Programme schedule day 1","authors":"M. Praba","doi":"10.1109/icoac.2011.6165223","DOIUrl":"https://doi.org/10.1109/icoac.2011.6165223","url":null,"abstract":"19 \" Roadway for sustainable disposal of scrap computers in India \" , Dr.","PeriodicalId":369712,"journal":{"name":"2011 Third International Conference on Advanced Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127005561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}