International Journal of Computer Science and Applications最新文献

筛选
英文 中文
Quantifying the Impact of Flood Attack on Transport Layer Protocol 量化洪水攻击对传输层协议的影响
International Journal of Computer Science and Applications Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4607
S. Tyagi
{"title":"Quantifying the Impact of Flood Attack on Transport Layer Protocol","authors":"S. Tyagi","doi":"10.5121/IJCSA.2014.4607","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4607","url":null,"abstract":"As growth of internet and computer increase day by day so as the growth of attacks on network is also tremendously increased day by day. In this paper we introduced a wired network and create two TCP source node and one attacker node (Distributed denial-of-service) flooding type attack which is the attack on the bandwidth of TCP node at source side sends data to destination through router and also measure the impact of Denial-of-service attack (DoS) on that wired network how packets of other source nodes and that node will drop down due to the impact of flooding type denial-of-service attack and shows the result using NS-2 NAM & Xgraph windows in simulation.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"131 1","pages":"79-87"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73810552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Parkinsons Disease Diagnosis Using Image Processing Techniques A Survey 应用图像处理技术诊断帕金森病综述
International Journal of Computer Science and Applications Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4605
A. Valli, G. Jiji
{"title":"Parkinsons Disease Diagnosis Using Image Processing Techniques A Survey","authors":"A. Valli, G. Jiji","doi":"10.5121/IJCSA.2014.4605","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4605","url":null,"abstract":"Clinical Diagnosis of Parkinson’s disease [PD] leads to errors, excessive medical costs, and provide insufficient services to the patients. There is no particular method or a test to detect the PD. The diagnosis of the Parkinson’s disease needs an accurate detection. Computer Aided Diagnosis (CAD) gives accurate results to detect the PD. These CAD can be embedded into a real time application for the early diagnosis of PD. Dopamine nerve terminals can be reduced in the brain parts such as Substantia nigra, Striatum, and other brain structures. This reduction which will lead to Parkinson’s disease. Dopamine Reduction gets automatically diagnosed by CAD and PD/normal patients can be found. For this, machine learning system (MLS)/CAD can be trained with the help of Artificial Neural Networks (ANN). Image processing techniques that are available to detect PD using MLS/CAD gets discussed in this paper.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"57-67"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79921124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
An Insight View of Digital Forensics 数字取证的洞察力
International Journal of Computer Science and Applications Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4608
N. Kishore, Chetna Gupta, Dhvani Dawar
{"title":"An Insight View of Digital Forensics","authors":"N. Kishore, Chetna Gupta, Dhvani Dawar","doi":"10.5121/IJCSA.2014.4608","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4608","url":null,"abstract":"Crime and violence are inherent in our political and social system. With the moving pace of technology, the popularity of internet grows continuously, with not only changing our views of life, but also changing the way crime takes place all over the world. We need a technology that can be used to bring justice to those who are responsible for conducting attacks on computer systems across the globe. In this paper, we present various measures being taken in order to control and deal with the crime related to digital devices. This paper gives an insight of Digital Forensics and current situation of India in handling such type of crimes.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"5 1","pages":"89-96"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82245401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of Retinal Vessels, Into Arteries And Veins - A Survey 视网膜血管分为动脉和静脉的分类综述
International Journal of Computer Science and Applications Pub Date : 2014-12-31 DOI: 10.5121/IJCSA.2014.4606
S. Maheswari, Anandhi S.V
{"title":"Classification of Retinal Vessels, Into Arteries And Veins - A Survey","authors":"S. Maheswari, Anandhi S.V","doi":"10.5121/IJCSA.2014.4606","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4606","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"35 1","pages":"69-78"},"PeriodicalIF":0.0,"publicationDate":"2014-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72585731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Efficient Path Selection and Data Transmission Using Queue in Open Shortest Path First 开放最短路径优先中基于队列的有效路径选择与数据传输
International Journal of Computer Science and Applications Pub Date : 2014-11-01 DOI: 10.14355/IJCSA.2014.0304.01
J. Kavitha, S. Palaniammal
{"title":"Efficient Path Selection and Data Transmission Using Queue in Open Shortest Path First","authors":"J. Kavitha, S. Palaniammal","doi":"10.14355/IJCSA.2014.0304.01","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.01","url":null,"abstract":"In network, information apportioning occurs between one communication points to another using TCP protocol. The collected data are shared among many users via Single Router or Access Point (AP). During routing, traffic is occurred in the network and that is known as Random Early Detection (RED). In order to overcome this, an alternative path must be preferred by using Alternative Path Selection method which utilizes the Queue Process (FIFO). In case the queue is full, it chooses an alternative queue by using channel sensing mode of path selection. Here, we use OSPF (Open Shortest Path First) which selects the shortest path in short period of time and also it delivers the data to the particular destination. However, delay is reduced in OSPF. Hence, efficiency and overall network lifetime is increased. Finally, the network performance is evaluated.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"8 1","pages":"139"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75723235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Intrusion Detection System Using Feature Selection and Classification Technique 基于特征选择和分类技术的入侵检测系统
International Journal of Computer Science and Applications Pub Date : 2014-11-01 DOI: 10.14355/IJCSA.2014.0304.02
S. Balakrishnan, Venkatalakshmi K, K. A
{"title":"Intrusion Detection System Using Feature Selection and Classification Technique","authors":"S. Balakrishnan, Venkatalakshmi K, K. A","doi":"10.14355/IJCSA.2014.0304.02","DOIUrl":"https://doi.org/10.14355/IJCSA.2014.0304.02","url":null,"abstract":"With the growth of Internet, there has been a tremendous increases in the number of attacks and therefore Intrusion Detection Systems (IDS’s) has become a main stream of information security. The purpose of IDS is to help the computer systems to deal with attacks. This anomaly detection system creates a database of normal behaviour and deviations from the normal behaviour to trigger during the occurrence of intrusions. Based on the source of data, IDS is classified into Host based IDS and Network based IDS. In network based IDS, the individual packets flowing through the network are analyzed where as in host based IDS the activities on the single computer or host are analyzed. The feature selection used in IDS helps to reduce the classification time. In this paper, the IDS for detecting the attacks effectively has been proposed and implemented. For this purpose, a new feature selection algorithm called Optimal Feature Selection algorithm based on Information Gain Ratio has been proposed and implemented. This feature selection algorithm selects optimal number of features from KDD Cup dataset. In addition, two classification techniques namely Support Vector Machine and Rule Based Classification have been used for effective classification of the data set. This system is very efficient in detecting DoS attacks and effectively reduces the false alarm rate. The proposed feature selection and classification algorithms enhance the performance of the IDS in detecting the attacks.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"1 1","pages":"145"},"PeriodicalIF":0.0,"publicationDate":"2014-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79742387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
An Approach to Decrease Dimensions of Drift Hetero-Bopolar Transistors 减小漂移异极晶体管尺寸的方法
International Journal of Computer Science and Applications Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4503
P. E.L, Bulaeva E.A
{"title":"An Approach to Decrease Dimensions of Drift Hetero-Bopolar Transistors","authors":"P. E.L, Bulaeva E.A","doi":"10.5121/IJCSA.2014.4503","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4503","url":null,"abstract":"In this paper based on recently introduced approach we formulated some recommendations to optimize manufacture drift bipolar transistor to decrease their dimensions and to decrease local overheats during functioning. The approach based on manufacture a heterostructure, doping required parts of the heterostructure by dopant diffusion or by ion implantation and optimization of annealing of dopant and/or radiation defects. The optimization gives us possibility to increase homogeneity of distributions of concentrations of dopants in emitter and collector and specific inhomogenous of concentration of dopant in base and at the same time to increase sharpness of p-n-junctions, which have been manufactured framework the transistor. We obtain dependences of optimal annealing time on several parameters. We also introduced an analytical approach to model nonlinear physical processes (such as massand heat transport) in inhomogenous media with time-varying parameters.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"98 1","pages":"25-51"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76452514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents. 网络安全事件自适应可理解优先级的概念与实践评估。
International Journal of Computer Science and Applications Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4508
Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek
{"title":"Concept and Practical Evaluation for Adaptive and Intelligible Prioritization for Network Security Incidents.","authors":"Leonard Renners, Felix Heine, Carsten Kleiner, G. Rodosek","doi":"10.5121/IJCSA.2014.4508","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4508","url":null,"abstract":"Worldwide Interoperability for Microwave Access (WiMAX) is a new communication technology that conduits the fissure between fixed and mobile access and offers the same Quality of Service (QoS) to both types of users. Generally, WiMAX is more vulnerable to the inside and outside attacks due to the absence of any clear line of defense. The Mobile Subscriber Stations (MSSs) selected to transfer the packets to the Base Station (BS) are vulnerable to Denial of Service (DoS) attacks like flooding. Recent research has discovered that DoS attacks can easily be launched by injecting malevolent management frames into the WiMAX network based on the Privacy and Key ManagementReSPonse (PKM-RSP) and Automatic Repeat ReQuest (ARQ)-Reset messages. In this paper, an algorithm is proposed to mitigate the flooding attacks and enhance the security level in the network.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"95 1","pages":"99-112"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74969406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment Of Wind Resource And Production In Oran, Algeria 阿尔及利亚奥兰风电资源及产量评价
International Journal of Computer Science and Applications Pub Date : 2014-10-31 DOI: 10.5121/IJCSA.2014.4504
Zakaria BOUZID, N. Ghellai, M. Belarbi
{"title":"Assessment Of Wind Resource And Production In Oran, Algeria","authors":"Zakaria BOUZID, N. Ghellai, M. Belarbi","doi":"10.5121/IJCSA.2014.4504","DOIUrl":"https://doi.org/10.5121/IJCSA.2014.4504","url":null,"abstract":"","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"54 1","pages":"53-60"},"PeriodicalIF":0.0,"publicationDate":"2014-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91110499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Distributed Mixed reality for diving and underwater tasks using Remotely Operated Vehicles 分布式混合现实潜水和水下任务使用远程操作车辆
International Journal of Computer Science and Applications Pub Date : 2014-10-01 DOI: 10.5121/ijcsa.2014.4501
M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem
{"title":"Distributed Mixed reality for diving and underwater tasks using Remotely Operated Vehicles","authors":"M. Chouiten, Christophe Domingues, Jean-Yves Didier, S. Otmane, M. Mallem","doi":"10.5121/ijcsa.2014.4501","DOIUrl":"https://doi.org/10.5121/ijcsa.2014.4501","url":null,"abstract":"Taking advantage of state of the art underwater vehicles and current networking capabilities, the \u0000visionary double objective of this work is to “open to people connected to the Internet, an access to \u0000ocean depths anytime, anywhere.” Today, these people can just perceive the changing surface of the sea \u0000from the shores, but ignore almost everything on what is hidden. If they could explore seabed and \u0000become knowledgeable, they would get involved in finding alternative solutions for our vital terrestrial \u0000problems – pollution, climate changes, destruction of biodiversity and exhaustion of Earth resources. \u0000The second objective is to assist professionals of underwater world in performing their tasks by \u0000augmenting the perception of the scene and offering automated actions such as wildlife monitoring and \u0000counting. The introduction of Mixed Reality and Internet in aquatic activities constitutes a technological \u0000breakthrough when compared with the status of existing related technologies. Through Internet, \u0000anyone, anywhere, at any moment will be naturally able to dive in real-time using a Remote Operated \u0000Vehicle (ROV) in the most remarkable sites around the world. The heart of this work is focused on \u0000Mixed Reality. The main challenge is to reach real time display of digital video stream to web users, by \u0000mixing 3D entities (objects or pre-processed underwater terrain surfaces), with 2D videos of live \u0000images collected in real time by a teleoperated ROV.","PeriodicalId":39465,"journal":{"name":"International Journal of Computer Science and Applications","volume":"11 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78593728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信