Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sivagami, R.
- A Survey on Intrusion Detection System
Abstract Views :190 |
PDF Views:3
Authors
R. Sivagami
1,
D. Sathya
1
Affiliations
1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, IN
1 Department of Computer Science and Engineering, Kumaraguru College of Technology, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 7, No 10 (2015), Pagination: 420-425Abstract
An intrusion detection system is a device or an application which monitor network, system activities for malicious activities, policy violations and also produces reports to a management station. This paper surveys proposed work on Intrusion Detection System and describe about comprehensive classification of various IDS approaches according to their employed detection technique. The main categories explored in this paper are anomaly detection, rule based intrusion detection and PCA based modular neural network. Thus the paper’s main aim is to include the most recent advancement in the area intrusion detection system as well as predict the future course of research.
Keywords
Anomaly, Intrusion Detection, Neural Network.- Network Security in Mobile AD-HOC Network (MANET)
Abstract Views :165 |
PDF Views:1
Authors
Affiliations
1 Department of Electronics and Communication Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
2 Department of Electronics and Communications Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
3 Department of Electrical and Electronics Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
1 Department of Electronics and Communication Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
2 Department of Electronics and Communications Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
3 Department of Electrical and Electronics Engineering, E.G.S.Pillay Engineering College, Nagapattinam, IN
Source
Networking and Communication Engineering, Vol 3, No 10 (2011), Pagination: 667-673Abstract
Mobile ad hoc networks have inherently different properties than traditional wired networks. These new characteristics present different security vulnerabilities and this paper provides a detailed classification of these threats. Threats exist to a mobile ad hoc network both from external nodes unauthorised to participate in the mobile ad hoc networks, and from internal nodes, which have the authorisation credentials to participate in the mobile ad hoc network. Internal nodes giving rise to threats can be further divided according to their behaviour — failed, badly failed, selfish and malicious nodes. Failed and selfish nodes are those which do not perform certain operations that the protocol spec- ifies that they should, the former due to some unfore seen failure and the latter due to selfishness to conserve power. Badly failed nodes may perform operations incorrectly, introducing false and misleading information into the network. Malicious nodes may deliberately disrupt the network using a variety of attacks. All categories of node behaviour should be considered when designing protocols for mobile ad hoc networks.Keywords
Security Vulnerabilities, Routing.- Review of Image Fusion Techniques and Evaluation Metrics for Remote Sensing Applications
Abstract Views :161 |
PDF Views:0
Authors
R. Sivagami
1,
V. Vaithiyanathan
1,
V. Sangeetha
1,
M. Ifjaz Ahmed
1,
K. Joseph Abraham Sundar
1,
K. Divya Lakshmi
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Low resolution Multispectral images obtained from earth observation satellite interpreted directly have less information which is not suitable for remote sensing applications. The advancement of sensors onboard satellites provides panchromatic images which have more image details and low-resolution MS images lead the way for the researchers to develop algorithms suitable for fusing multi-sensor images which can improve the resolution of the MS images. In this paper review on various pixel based fusion algorithms and evaluation metrics are presented. From the literature review, it is inferred that the Multi resolution techniques will give better accuracy than all other traditional algorithms.Keywords
Evaluation Metrics, Fusion Algorithms, Fusion Transforms, Image Fusion, Remote Sensing- Skeletonisation Approaches for Determining Paths in an Image: A Review
Abstract Views :187 |
PDF Views:0
Authors
V. Sangeetha
1,
V. Vaithiyanathan
1,
R. Sivagami
1,
K. Divyalakshmi
1,
K. Joseph Abraham Sundar
1,
M. Ifjaz Ahmed
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Skeletonisation is an effective way to provide an intact representation of an object’s shape. This approach has great applications in the fields of motion planning, object representation, tracking, information retrieval, topology representation, sensor distribution and location, facility location, forestry application, building constructions etc. Skeletons naturally provide a pixel to boundary mapping through which the path between points can be found in a terrain map. Many approaches for determining the skeleton of a terrain exist. In this paper, the different methods for Skeletonisation are discussed. Initially the various categorizations of Skeletonisation is discussed which is further followed by application of those algorithms for path determining. Quantitative measures for validating the skeleton are also discussed. Finally, the applications of Skeletonisation in various domains are elaborated.Keywords
Distance Map, Distance Transform, Skeletonisation, Thinning, Voronoi Diagram- Evaluation of Distance Functions for the Comparison of Gradient Orientation Histograms
Abstract Views :157 |
PDF Views:0
Authors
V. Vaithiyanathan
1,
K. Divya Lakshmi
1,
K. Joseph Abraham Sundar
1,
M. Ifjaz Ahmed
1,
V. Sangeetha
1,
R. Sivagami
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613402, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Local features of an image are used in many computer vision applications such as object detection and scene matching. The gradient orientation histogram is used by many local features such as Scale Invariant Feature Transform (SIFT), a widely used image local feature. This paper discusses various distance functions that can be used to measure the similarity between the local features described by the gradient orientation histogram. A distance function, based on the quadratic form is proposed for the SIFT descriptor. The state of the art distance functions - Euclidean, Chi-square, Manhattan and the proposed quadratic form based distance function are calculated between the features extracted from the images. Nearest neighborhood ratio strategy is used to find the corresponding features based on the distance measure. Correct matches are estimated using the ground truth transformation function between the images, present in the form of homograph matrix. It is experimentally found that the proposed distance function has an execution time reduced by 21% compared to the Euclidean distance for a similar accuracy performance. The proposed distance retrieves more number of correct matches compared to the modified Earth Mover distance which is fastest among the evaluated distance functions. The future work will be aimed at improving the time taken for computing the distance matrix between the feature sets and a better strategy for computing the matches.Keywords
Distance Functions, Gradient Orientation Histogram, Image Matching, Local Features, SIFT- Super Resolution Image Reconstruction using Frequency Spectrum
Abstract Views :143 |
PDF Views:0
Authors
K. Joseph Abraham Sundar
1,
K. Divyalakhsmi
1,
M. Ifjaz Ahmed
1,
R. Sivagami
1,
V. Sangeetha
1,
V. Vaithiyanathan
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur - 613 401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur - 613 401, Tamil Nadu, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Super resolution image reconstruction is defined as generating a high resolution image from a low resolution image or sequence of low resolution images captured from identical scene apparently a video. An algorithm for reconstructing a high resolution image from a low resolution image by altering the frequency components is discussed in this paper. In this method the high frequency components of the zoomed low resolution image is modified so as to increase the resolution of the low resolution image. The evaluation for the experiments is based on the performance measure matrix peak signal to noise ratio. The experimental results shown proves that the algorithm is highly advantageous and computationally fast compared to the other interpolation methods. The algorithm will be helpful in practical applications of medical imaging diagnosis, remote sensing and military applications.Keywords
Filters, Frequency Spectrum, Interpolation, Image Reconstruction, Super Resolution- Spatial Injection to Low Resolution Images using IIHS Transform
Abstract Views :174 |
PDF Views:0
Authors
M. Ifjaz Ahmed
1,
R. Sivagami
1,
K. Joseph Abraham Sundar
1,
K. Divyalakshmi
1,
V. Sangeetha
1,
V. Vaithiyanathan
1
Affiliations
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN
1 School of Computing, SASTRA University, Thanjavur – 613401, Tamil Nadu, IN