Refine your search
Collections
Co-Authors
Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Luhach, Ashish Kr.
- To Enhance the Security in Wireless Nodes using Centralized and Synchronized IDS Technique
Abstract Views :169 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, IN
1 Department of Computer Science and Engineering, Lovely Professional University, Phagwara - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 32 (2016), Pagination:Abstract
Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it’s very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.Keywords
Attacks, Anomaly, Cluster, Intrusion Detection System, Malicious.- Analysis of Lightweight Cryptographic Solutions for Internet of Things
Abstract Views :204 |
PDF Views:0
Authors
Isha
1,
Ashish Kr. Luhach
1
Affiliations
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
1 Lovely Professional University, Jalandhar - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
Internet of Things (IoT) enables physical things to communicate, compute and take decisions based on any network activity. This calls for a secure solution for communication among heterogeneous devices. With the development in Information and Communication Technology (ICT), a unique impact of smart things is observed in our everyday life. IoT can consider users that interact in heterogeneous environment. In heterogeneous environment motive of each user in IoT can be different in form of communication and computation and is difficult to be judged. A malicious user can destroy the security and privacy of the network. This study gives a detailed analysis of existing security solutions for IoT. Firstly, a comparison of lightweight cryptography algorithms is made on basis of block size, key size, number of rounds, and probable attacks. Later, the various security issues in IoT are discussed along with possible solution. Security solutions in IoT will improve the trust over IoT. A secure solution that will require less computational power and is less vulnerable to existing attacks is desired.Keywords
Internet of Things (IoT), Lightweight Algorithms, Radio Frequency Identification (RFID), Wireless Sensor Networks (WSN).- An Optimal Load Balancing Technique for Cloud Computing Environment using Bat Algorithm
Abstract Views :147 |
PDF Views:0
Authors
Affiliations
1 School of Computer Science and Engineering, Lovely Professional University, Jalandhar-Delhi, G.T. Road, National Highway 1, Phagwara - 144411, Punjab, IN
1 School of Computer Science and Engineering, Lovely Professional University, Jalandhar-Delhi, G.T. Road, National Highway 1, Phagwara - 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
Background/Objectives: In this research, load balancing algorithm based on Bat Algorithm is implemented to achieve the goals of load balancer. Methods/Statistical Analysis: The proposed algorithm is implemented using “Parallel Processing toolbox” in Mat lab and the results are compared with other techniques, namely, Round Robin and Fuzzy GSO. Findings: Results are discussed in the context of response time and based on the number of tasks. While balancing the load among the virtual machines, job migration to another virtual machine will affect the response time. In future, further work is on the development of job migration algorithm.Keywords
BAT Algorithm, Cloud Computing, Load Balancing.- Designing and Implementation of Neural Network using Membership Functions of Fuzzy
Abstract Views :141 |
PDF Views:0
Authors
Affiliations
1 School of Computer Sciences and Engineering, Lovely Professional University, Phagwara – 144411, Punjab, IN
1 School of Computer Sciences and Engineering, Lovely Professional University, Phagwara – 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
Background/Objectives: An extensive literature survey has been carried out and focused on variety of application and different research area for many data mining techniques in Multinational Company (MNC). Methods/Statistical Analysis: In this research paper we find the best cluster to extract meaningful data from large and complex pattern of neural network. This work is implemented on MATLAB Tool. By applying all the functions of research methodology we found the best cluster. This research work is compared with SOM Topology and can be used in so many applications such as biometric etc. Findings: Variety of application and different research area are identified which will be helpful and marked important for many data mining techniques in Multinational Company (MNC) and large organization for decision maker for all research resources. A methodology is proposed that focuses on zoning of neural network via membership function of Fuzzy Logic. This method removes the complexity of pattern extract the best sample easily. Application/Improvements: In future, this method will work on biometric like it will identify finger prints easily. It will divide the pattern and keep them into the zones and find the best one easily.Keywords
Membership Function, Neurons, Zones.- An Approach to Analyse the Agriculture Acreage and Estimate Production
Abstract Views :156 |
PDF Views:0
Authors
Affiliations
1 School of Computer Science and Engineering, Lovely Professional University, Jalandhar-Delhi G.T. Road, National Highway 1, Phagwara – 144411, Punjab, IN
1 School of Computer Science and Engineering, Lovely Professional University, Jalandhar-Delhi G.T. Road, National Highway 1, Phagwara – 144411, Punjab, IN
Source
Indian Journal of Science and Technology, Vol 9, No 28 (2016), Pagination:Abstract
Background/Objective: Crop acreage and production estimate is of great challenge and requires strategic decisions to be taken by government agencies regarding controlling import and export duties and also to control inflation as a whole. Methods/Statistical Analysis: A lot of techniques exist to measures the yield and production for a given area and that too crop wise. We estimate the crop acreage with the help of remote sensing data and geographic information system techniques. In remote sensing, we acquire information related to the earth surface and to determine the crop acreage with the help of remote sensing images. We extract the useful information related to the yield estimation. Findings: In image processing, it is used to analyze or manipulate the features of an image. We used K-mean clustering and Self Organizing Map algorithms here for the crop Acreage and production estimation as a comparative approach to measure out acreage for a specific area image. By applying different image processing techniques and using the remote sensing techniques we estimated the production estimates for crops and compared the results with actual data obtained from statistical sources. Geographic Information System is widely used in crop acreage and production estimation to find out the locations of a particular image and helps in improving the accuracy of estimates. The challenge still remained regarding the crop segregation which requires lot of ground truth validation and hence makes the approach less viable as it reduces accuracy. Self organizing maps were found to be giving better results than other approaches. Applications/Improvement: It can be used by government agencies for taking decisions regarding import/export duty control and by agencies interested in procurement of crops and can be used by RBI to tackle Inflation as well.Keywords
Remote Sensing, Geographic Information System, Un Supervised Classification, K Means, SOM Algorithm, Supervised Classification.- Community Overlapping Detection in Complex Networks
Abstract Views :164 |
PDF Views:0
Authors
Affiliations
1 Lovely Professional University, Phagwara - 144411, Punjab, IN
1 Lovely Professional University, Phagwara - 144411, Punjab, IN