SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Kannan Anand) "

Sökning: WFRF:(Kannan Anand)

  • Resultat 1-17 av 17
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Anand, K., et al. (författare)
  • A Rule Based Approach for Attribute Selection and Intrusion Detection in Wireless Sensor Networks
  • 2012
  • Ingår i: International Conference On Modelling Optimization And Computing. - : Elsevier. ; , s. 1658-1664
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we propose a new rule based attribute selection algorithm for removing the redundant attributes which are used in decision making on intrusions in wireless sensor networks. This work focuses mainly on finding important attributes to find Denial of Service attacks. In addition, we used an enhanced MSVM classification algorithm that was developed by extending the existing MSVM algorithm. The experimental results show that the proposed methods provide high detection rates and reduce false alarm rate. This system has been tested using KDD'99 Cup data set.
  •  
2.
  • Vijayakumar, P., et al. (författare)
  • Hierarchical key management scheme for securing mobile agents with optimal computation time
  • 2012
  • Ingår i: International Conference on Modelling Optimization and Computing. - : Elsevier. ; , s. 1432-1443
  • Konferensbidrag (refereegranskat)abstract
    • The Mobile agents are well suited for accessing contents of distributed web based applications including internet business. Such kinds of access must be secure enough enabling only authorized mobile agents to retrieve the contents from the distributed servers. This kind of security is provided by several algorithms including RSA based digital signature and elliptic curve digital signature cryptography. The main differences among the algorithms of the past literatures lie in the computational time of encryption and decryption of the keys used for encrypting and decrypting the content. In this paper we propose a modified hierarchical date constrained key management scheme which potentially reduces the overall computation time needed for key derivation and key signature check operations. Different algorithms are compared with our proposed mechanism and the experimental results show that the proposed method reduces the overall key derivation and key signature check computational time.
  •  
3.
  • Chithra, G. K., et al. (författare)
  • Android application for ticket collector in trains
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:Special Issue 2, s. 1015-1022
  • Tidskriftsartikel (refereegranskat)abstract
    • The main objective of this android app is that the ticket collector checks the traveller price tag and updates the traveller list to the information whether or not the passengers are travelling in the train according to their tickets with their individual dates of a journey. This app starts with a login page. The ticket collector updates the user id and watchword manually to IRCTC and therefore the management stores his user-id and watchword within the information. So, the ticket collector 1st needs to login to the app together with his individual user-id and password. Then once logging in to the app, HOME page is displayed. during this page, the ticket collector needs to select the train range and so the date of journey and therefore the diary number and then submits this page. Then he gets the traveller list and therefore the ticket collector checks the traveller list and updates the list supported who is travelling. And at that time submits the checked traveller list and then it gets updated to the information. This app helps the ticket collector most. Some passengers take the general price tag and request ticket collector for the berth or seat within the reservation coach. So, at this time this app helps the ticket collector to look at the quantity of vacant seats. It reduces the looking out time for the ticket collector. the quantity of vacant seats is displayed once the ticket collector simply clicks the quantity of vacant seat availability option. The porter asks the traveller regarding his/her supply and destination that he needed the price tag. So, supported the traveller necessities the ticket collector chooses the supply and destination that the traveller desires the seat or berth. So, if the seats square measure vacant then the ticket collector checks the number to be paid by the traveller as fine and so asks the fine and if the traveller pays the fine to the ticket collector then he updates the traveller details who need the price tag and so he updates the traveller details to the database.
  •  
4.
  • Jaisankar, N., et al. (författare)
  • An intelligent agent based intrusion detection system using fuzzy rough set based outlier detection
  • 2012
  • Ingår i: Studies in Computational Intelligence. - Berlin, Heidelberg : Springer Berlin/Heidelberg. ; , s. 147-153
  • Bokkapitel (refereegranskat)abstract
    • Since existing Intrusion Detection Systems (IDS) including misuse detection and anomoly detection are generally incapable of detecting new type of attacks. However, all these systems are capable of detecting intruders with high false alarm rate. It is an urgent need to develop IDS with very high Detection rate and with low False alarm rate. To satisfy this need we propose a new intelligent agent based IDS using Fuzzy Rough Set based outlier detection and Fuzzy Rough set based SVM. In this proposed model we intorduced two different inteligent agents namely feature selection agent to select the required feature set using fuzzy rough sets and decision making agent manager for making final decision. Moreover, we have introduced fuzzy rough set based outlier detection algorithm to detect outliers. We have also adopted Fuzzy Rough based SVM in our system to classify and detect anomalies efficiently. Finally, we have used KDD Cup 99 data set for our experiment, the experimental result show that the proposed intelligent agent based model improves the overall accuracy and reduces the false alarm rate.
  •  
5.
  • Kannan, Anand, et al. (författare)
  • A novel cloud intrusion detection system using feature selection and classification
  • 2015
  • Ingår i: International Journal of Intelligent Information Technologies. - : IGI Global. - 1548-3657 .- 1548-3665. ; 11:4, s. 1-15
  • Tidskriftsartikel (refereegranskat)abstract
    • This paper proposes a new cloud intrusion detection system for detecting the intruders in a traditional hybrid virtualized, cloud environment. The paper introduces an effective feature selection algorithm called Temporal Constraint based on Feature Selection algorithm and also proposes a classification algorithm called hybrid decision tree. This hybrid decision tree has been developed by extending the Enhanced C4.5 algorithm an existing decision tree based classifier. Furthermore, the experiments conducted on the sample Cloud Intrusion Detection Datasets (CIDD) show that the proposed cloud intrusion detection system provides better detection accuracy than the existing work and reduces the false positive rate.
  •  
6.
  • Kannan, Anand, et al. (författare)
  • Genetic algorithm based feature selection algorithm for effective intrusion detection in cloud networks
  • 2012
  • Ingår i: Proceedings - 12th IEEE International Conference on Data Mining Workshops, ICDMW 2012. - : IEEE. - 9780769549255 ; , s. 416-423
  • Konferensbidrag (refereegranskat)abstract
    • Cloud computing is expected to provide on-demand, agile, and elastic services. Cloud networking extends cloud computing by providing virtualized networking functionalities and allows various optimizations, for example to reduce latency while increasing flexibility in the placement, movement, and interconnection of these virtual resources. However, this approach introduces new security challenges. In this paper, we propose a new intrusion detection model in which we combine a newly proposed genetic based feature selection algorithm and an existing Fuzzy Support Vector Machines (SVM) for effective classification as a solution. The feature selection reduces the number of features by removing unimportant features, hence reducing runtime. Moreover, when the Fuzzy SVM classifier is used with the reduced feature set, it improves the detection accuracy. Experimental results of the proposed combination of feature selection and classification model detects anomalies with a low false alarm rate and a high detection rate when tested with the KDD Cup 99 data set.
  •  
7.
  • Kannan, Anand, et al. (författare)
  • N-ary tree based key distribution in a network as a service provisioning model
  • 2012
  • Ingår i: ICACCI '12 Proceedings of the International Conference on Advances in Computing, Communications and Informatics. - New York, NY, USA : ACM Digital Library. - 9781450311960 ; , s. 952-960
  • Konferensbidrag (refereegranskat)abstract
    • Cloud networking is a new technology which integrates network provisioning with the existing cloud service provisioning models. This integration allows service providers to provision network resources together with network performance guarantees as a part of their service offering. However, the introduction of multiple providers and service levels introduces many security challenges. One such challenge is identity management, especially authentication of different entities. This paper presents an analysis of a management scheme deployed in a simulated cloud network test bed. Our results show that this scheme is faster than binary and erasure encoding schemes. The scheme uses an N-ary approach and thus allows the placement of n entities at each level, unlike the binary scheme which is restricted to two entities.
  •  
8.
  • Monika, K., et al. (författare)
  • Theft vehicle scheme using cloud computing techniques
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:Special Issue 2, s. 1023-1031
  • Tidskriftsartikel (refereegranskat)abstract
    • Due to proliferation in the metropolitan areas there existing problem of poor traffic congestion has grown at alarming event and it is not easy to find the stolen vehicles. So here we use Theft vehicle detection system for finding the theft vehicles using open source hardware of RASPBERRY PI.This system make use of RFID and embedded technology. Here each vehicle is placed with RFID tag. Whenever the RFID reader reads the RFID tag in the stolen vehicle it alert the traffic police and the signal will be automatically changed into red light until the vehicle is recovered from the stolen person. This is achieved by connecting cloud technology with server which is handle by the traffic police. When the traffic controller ensures that the particular vehicle is missed then, whenever that particular vehicle crossed by the any signal red light blinks automatically then cloud displays the message with vehicle number.By using this system, we can alert the signal and can easily find the stolen vehicle by tracking the RFID tag.
  •  
9.
  • Rangarajan, Sathyanarayanan, et al. (författare)
  • V2C : A secure vehicle to cloud framework for virtualized and on-demand service provisioning
  • 2012
  • Ingår i: ICACCI '12 Proceedings of the International Conference on Advances in Computing, Communications and Informatics. - New York, NY, USA : ACM. - 9781450311960 ; , s. 148-154
  • Konferensbidrag (refereegranskat)abstract
    • Cloud computing has revolutionized the IT industry by enabling a virtualized resource provisioning model for organizations. The Network-as-a-Service (NaaS) provisioning model enables new ways of providing virtually isolated and on-demand networking capabilities in existing cloud provisioning models, resulting in best-effort performance, scalable data throughput, reduced latency, and reduced configuration complexity. In this paper we propose V2C, an elastic Vehicle-to-Cloud infrastructure that integrates NaaS into the automotive ecosystem and enables provisioning of vehicle-based services for automobile users. However, V2C introduces various security challenges and the main objective of this paper is to propose a secure provisioning model to address them.
  •  
10.
  • Razia Sulthana, A., et al. (författare)
  • Improvement on software testing techniques and tools
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:2 Special Issue, s. 1049-1058
  • Tidskriftsartikel (refereegranskat)abstract
    • Programming Testing is a procedure of discovering mistakes while executing a program with the goal that we get a zero deformity programming. It is gone for assessing the ability or ease of use of a program. Programming testing is an essential methods for getting to nature of programming. Despite the fact that a great deal of progressions have been done in formal strategies and check procedures, still we require programming to be completely tried before it could be dealt with to the client side. Subsequently there are various trying systems and instruments made to finish the undertaking. Programming testing is a vital zone of research and a great deal of advancement has been made in this field. In this paper, testing systems and apparatuses have been depicted. Some run of the mill most recent inquiries about have been outlined. Programming testing is increasing increasingly significance later on. 
  •  
11.
  • Sharma, A., et al. (författare)
  • Bridging the security drawbacks of virtualized network resource provisioning model
  • 2012
  • Ingår i: EWDCC '12 Proceedings of the 1st European Workshop on Dependable Cloud Computing. - New York, NY, USA : ACM. - 9781450311496
  • Konferensbidrag (refereegranskat)abstract
    • Cloud networking receives a lot of attention from the research community, especially due to its ability to bridge the dependability gaps in the existing cloud service provisioning models by enabling provisioning of virtualized network resources and providing network guarantees to the end-user. In cloud networking, network resources shared between multiple tenants are virtualized, and provisioned to customers in an elastic fashion. However, the existing cloud networking systems have many drawbacks pertaining to security, management, and performance. Therefore, it is necessary to develop new security architectures and suitable algorithms to provide effective security to the virtualized network resources available in the cloud. In this paper, we propose a new architecture which focuses on providing a security mechanism for cloud network resource provisioning models. The central feature of this architecture is a hierarchical, multi-domain, and multi-level security goal translation function which promotes security of the virtualized network resources and trust management between the service providers.
  •  
12.
  • Sravani, K., et al. (författare)
  • Prescription viewer medcare application using android programming
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:Special Issue 2, s. 1360-1370
  • Tidskriftsartikel (refereegranskat)abstract
    • Living healthy is valuable to everyone. The expert assumes an essential part in sparing one's life by giving the therapeutic solution. The issues faced by patients in their busy lives can't keep the records of prescription safely, inappropriate and overdosed admission of meds furthermore neglecting to get meeting with specialist by going to doctor's facility. This can be explained by Medcare application using android programming. Android is the Operating System that has huge development as of late. The fundamental plan of this paper is to make patients sensible about the application, through which they can see the medicine given by specialist, set suggestion to planned drug, find adjacent drug stores and can alter next meeting with particular branch of specialist without going to healing facility.
  •  
13.
  • Tamil Priya, D., et al. (författare)
  • Similarity based face identification using metrics analysis
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:Special Issue 2, s. 1371-1378
  • Tidskriftsartikel (refereegranskat)abstract
    • Confront acknowledgment framework is one of the biometrics strategies that are utilized as a part of assortment of uses utilizing the picture handling systems. Confront acknowledgment framework is produced utilizing the Mat lab condition with the systems took after by main segment investigation and the straight discriminant examination. The execution is measured utilizing the time rate, remove rate, pixel values and the element separated determination rate. The ideal acknowledgment is executed when the time traverse around half and the separation rate around the 90 %. What’s more, on account of pixel and determination, when the pixel qualities are expanding then the determination calculate ought to likewise be an expanding request. On the off chance that the removed element contains more pixels then the determination element is progressively that identifies with the quality in separating the element. The execution is measured utilizing the two distinctive programming metric techniques to be specific spearmen and Pearson metric. At that point the general measure is characterized by picking up with the two metric strategies. The execution is plotted utilizing the diagram to foresee the rate of time and extricated include.
  •  
14.
  • Uma, K., et al. (författare)
  • A novel method for smart vehicle safety
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 2017:Special Issue 2, s. 1259-1269
  • Tidskriftsartikel (refereegranskat)abstract
    • This to a great extent reduces the manpower, saves time and operates efficiently without human intervention. With the advent in technology, the existing systems are developed to have in built intelligence. The proposed work to monitor the pressure of the vehicle tire using the Arduino, this will be very much helpful to avoid the burst of tire and to understand about the tire pressure under various load situation of a vehicle. fuel level and the location can be updated during abnormal condition using wireless technology. The accident can be monitored using the high level vibration sensor and if the accident has occurred in any location it can immediately inform to the nearby hospital or ambulance service, the location of the accident. It is tire pressure monitoring. Pressure sensor acts as a main role to monitor the pressure of the vehicle, and it reports to the owner of the vehicle when the pressure gets low with the help of GSM work. This GSM work and the pressure sensor is connected to the Arduino board with the help of connecting wires. It is fuel level monitoring. Fuel level sensor is used to monitor the fuel of the vehicle and when the fuel gets low a message is automatically sent to the owner of the vehicle with the help of GSM work. This GSM work and the fuel sensor is connected to the arduino board with the help of connecting wires. It is accident tracking and intimating to nearby hospital. If the accident happens to the vehicle, with the help of vibration sensor the accident is recorded. The vibration is transmitted to GPS, GPS tracks the location of the vehicle and sent to GSM. It sends message to the nearby hospital and the hospital management has to take the responsibility in taking patient to the hospital for treatment.
  •  
15.
  • Uma, K., et al. (författare)
  • Scanned compound images using different compression techniques
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 9:Special Issue 2, s. 994-1000
  • Tidskriftsartikel (refereegranskat)abstract
    • This Paper involves a detailed study of different compression techniques of scanned compound images. A compound image is a different kind of image that contains text, natural image and graphic image. Some of the Image compression techniques which include DCT,JPEG, H.264,MMP AND APM-MMP have been reviewed and presented in this paper. Discrete cosine transform (DCT) is a method which compresses the compound image without any loss of data. To compress image DCT is computed using two dimensional functions (2D).Join Picture Expert Group(JPEG) is mostly used as standard format for compressed images. Due to loss of data the compressed image differs from the original image.H.264 is a video compression standard which is also capable of compressing a compound image.MMP is specifically calculated to encode separately the macro blocks information of text and image. Since complexity is high in these above techniques the proposed technique Adaptive Probability Model-MMP solves the limitations like redundant data removal and enhances the image quality. It also improves the encoding efficiency thus modifying the MMP’s character.
  •  
16.
  • Uma, K., et al. (författare)
  • The challenges and issues on big data analytics
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 2017:Special Issue 2, s. 1242-1258
  • Tidskriftsartikel (refereegranskat)abstract
    • A tremendous store of terabytes of information is created every day from present day data frameworks and advanced innovations, for example, Internet of Things and cloud computing. Analysing of these terabytes of information requires a ton of activities at various levels to extract data from knowledge base. In this manner, big data examination is a momentum region of innovative work. The fundamental goal of this paper is to analyse the potential effect of big data challenges, open research issues, and different tools related with it. Accordingly, this article gives a stage to investigate big data information at various stages. It finally provides the researchers to develop the solution based upon their challenges and also provides research issues.
  •  
17.
  • Vijayakumar, M., et al. (författare)
  • Security issues in cloud computing
  • 2017
  • Ingår i: Journal of Advanced Research in Dynamical and Control Systems. - : Institute of Advanced Scientific Research, Inc.. - 1943-023X. ; 2017:Special Issue 2, s. 1001-1014
  • Tidskriftsartikel (refereegranskat)abstract
    • Recently, cloud computing has become an important part of Information Technology. Cloud computing is a network based environment which provides platform for sharing and processing data and services over internet. Cloud computing is one of the greatest trendy vocabulary in the PC world nowadays. It permits asset sharing that incorporates programming, stage and framework by means of virtualization. Virtualization is the center innovation behind cloud asset sharing. This condition endeavors to be alterable, dependable, and adjustable with an ensured nature of administration. It gives the capacity to use versatile, circulated processing conditions through the Internet. Throughout the years, cloud computing has developed from being a capable business idea to a quickly developing part in IT associations. It has developed as a capable facilitating stage that permits a wise utilization of a gathering of uses, data and framework included pools of PC, system and capacity assets. In any case, undertaking clients are as yet cautious to send their business in the cloud. Security is one of the key component which hamper development of cloud computing. It is as quite a bit of an issue in the cloud as it is anyplace else. Distinctive individuals share diverse point of view on distributed computing. Some trust it is dangerous to utilize cloud. Cloud merchants make a special effort to guarantee security.Cloud computing has ability to solve various problems but it cannot address certain issues like reliability, performance and security, among which security is the most common issue seen in cloud computing. This paper proposes some solutions to some security issues.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-17 av 17

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy