• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 2,521
Next 10 →

Publisher IJCSN

by Fatima Vijayakamal
"... Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose ..."
Abstract - Add to MetaCart
Intrusion detection systems play an important role in detecting online intrusions and provide necessary alerts. Intrusion detection can also be done for relational databases. Intrusion response system for a relational database is essential to protect it from external and internal attacks. We propose a new intrusion response system for relational databases based on the database response policies. We have developed an interactive language that helps database administrators to determine the responses to be provided by the response system based on the malicious requests encountered by relational database. We also maintain a policy database that maintains policies with respect to response system. For searching the suitable policies algorithms are designed and implemented. Matching the right policies and policy administration are the two problems that are addressed in this paper to ensure faster action and prevent any malicious changes to be made to policy objects. Cryptography is also used in the process of protecting the relational database from attacks. The experimental results reveal that the proposed response system is effective and useful.

Control-aware wireless sensor network platform for the smart electric grid, IJCSNS 9

by James Gadze , 2009
"... The communications needs of monitoring and control of the electric grid is traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communic ..."
Abstract - Cited by 3 (0 self) - Add to MetaCart
The communications needs of monitoring and control of the electric grid is traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used contention access protocols which result in high unsuccessful transmission and delay. The use of embedded wireless sensor and actuator networks for monitoring and control of the electric grid requires secure, reliable and timely exchange of information among controllers, distributed sensors and actuators. The exchange of information is over a shared wireless medium. However, wireless media is highly unpredictable due to path loss, shadow fading and ambient noise. Monitoring and control applications have stringent requirements on reliability, delay and security. The primary issue addressed in this paper is the impact of harsh power system environment on reliable and timely information exchange in wireless sensor and actuator networks. A combined networking and information theoretic approach was adopted to determine the transmit power required to maintain a minimum wireless channel capacity for reliable data transmission. We also develop a channel-aware optimal slot allocation scheme that ensures efficient utilization of the wireless link and guarantee delay. Various analytical evaluations and simulations are used to evaluate and validate the feasibility of the methodologies and demonstrate that the protocols achieved reliable and real-time data delivery in wireless industrial sensor networks. Key words: Embedded wireless sensor network, real-time monitoring and control, reservation- TDMA, cross-layer optimization 1.

A Development of an ISG Framework for Mosul’s Health Sector.", ijcsn, vol 1, issue 3,2012

by Mohammad Salim, Marini Othman, Maha M. Ablahd, Kajang Selangor
"... The world has started to appreciate more and more the value of information and its impact on the community. This paper shares the findings of a study done on information security implementation at Mosul’s health sector. The study was conducted via a self-administrated questionnaire and interview. Th ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
The world has started to appreciate more and more the value of information and its impact on the community. This paper shares the findings of a study done on information security implementation at Mosul’s health sector. The study was conducted via a self-administrated questionnaire and interview. The respondents are the IT managers and personnel with functions related to IT in selected hospitals in the city of Mosul. The findings reveal an ISG status that is in dire need for improvement to maintain suitable level of security of information which can be achieved through having good governance practices in place. However there are various degrees of implementation by the hospitals. It is recommended that these findings be used as basis for developing a secure information-based system for the respective hospitals.

IJCSNS International Journal of Computer Science and Network Security, VOL.6 No.2B, February 2006 Real-time statistical rules for spam detection

by Quang-anh Tran, Haixin Duan, Xing Li
"... statistical-based. The former refers to the detection which is performed by looking for spam-liked patterns in an email. Since the rules can be shared, they have been popularized quickly. The rules, however, are built manually it is hard to keep them up with the variation of spam. The statistical-ba ..."
Abstract - Add to MetaCart
statistical-based. The former refers to the detection which is performed by looking for spam-liked patterns in an email. Since the rules can be shared, they have been popularized quickly. The rules, however, are built manually it is hard to keep them up with the variation of spam. The statistical-based method, on the other hand, is possible to make the detector retrained quickly, but knowledge obtained from this method is unable to be shared among the servers. We, therefore, proposed a statistical rule-based method for spam detection. A widely used rule set-Chinese_rules.cf, for SpamAssassin to catch spam written in Chinese is generated by this method. It can be updated automatically and can also be shared among servers. A generating process of the Chinese_rules.cf is described. Factors that control the rule’s performance are discussed.

A test of the interoperability of grid middleware for the Korean High Energy Physics Data Grid system”, IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.3, March 2007. Mr. Husni Hamad Al-Mistarihi is a PhD candidate in the S

by Kihyeon Cho - in the School of Computer Sciences, Universiti Sains Malaysia (USM). He
"... In this paper, the current architecture of the High Energy Physics (HEP) data grid system in Korea is described. An overview is given for the current and planned uses of grid ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In this paper, the current architecture of the High Energy Physics (HEP) data grid system in Korea is described. An overview is given for the current and planned uses of grid

Overview on VoIP: Subjective and Objective Measurement Methods”, IJCSNS International Journal of Computer Science and Network Security, Vol.6 No.1B, January 2006 Author Biographies Wojciech Mazurczyk received the B.S. and M.S. degrees in Telecommunication

by Floriano De Rango, Mauro Tropea, Salvatore Marano - Department of Electronics and Information Technology of Warsaw University of Technology, Poland
"... In this paper we have carried out an accurate overview on Voice over IP QoS evaluation techniques. We have described in a detailed way the most important measurement methods that are subdivided in subjective and objective methods. Subjective measurements (e.g. Mean Opinion Score- MOS) are the benchm ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In this paper we have carried out an accurate overview on Voice over IP QoS evaluation techniques. We have described in a detailed way the most important measurement methods that are subdivided in subjective and objective methods. Subjective measurements (e.g. Mean Opinion Score- MOS) are the benchmark for objective methods, but they are slow, time consuming and expensive. Objective measurements can be intrusive or non-intrusive. Intrusive methods (e.g. Perceptual Evaluation of Speech Quality- PESQ) are more accurate, but normally are unsuitable for monitoring live traffic because of the need for a reference data and to utilise the network. Non-intrusive methods, instead, are a measurement based on observing parameters that permit the individuation of voice signal quality. The possibility of having the telephony on Internet presents a lot of advantages, first of all it gives the capability of constructing a single network for transporting voice and data signals. Moreover, it provides the growth of new type of applications that can take advantage of internet network. At last, IP traffic charge is much less than traditional one because it is independent of the path length. Key words:

Global Optimization Algorithms -- Theory and Application

by Thomas Weise , 2011
"... This e-book is devoted to Global Optimization algorithms, which are methods for finding solutions of high quality for an incredible wide range of problems. We introduce the basic concepts of optimization and discuss features which make optimization problems difficult and thus, should be considered ..."
Abstract - Cited by 94 (26 self) - Add to MetaCart
This e-book is devoted to Global Optimization algorithms, which are methods for finding solutions of high quality for an incredible wide range of problems. We introduce the basic concepts of optimization and discuss features which make optimization problems difficult and thus, should be considered when trying to solve them. In this book, we focus on

Fall detection by embedding an accelerometer in cellphone and using kfd algorithm

by Tong Zhang, Jue Wang, Ping Liu, Jing Hou - IJCSNS International Journal of Computer Science and Network Security , 2006
"... The fall is a risky event in the elderly people’s daily living, especially the independent living, it often cause serious injury both in physiology and psychology. Wearable sensor based fall detection system had been proved in many experiments for its feasibility and effectiveness, but there remain ..."
Abstract - Cited by 23 (0 self) - Add to MetaCart
The fall is a risky event in the elderly people’s daily living, especially the independent living, it often cause serious injury both in physiology and psychology. Wearable sensor based fall detection system had been proved in many experiments for its feasibility and effectiveness, but there remain some crucial problems, include: the people maybe forget to wear the clothes with micro sensors, which device standard should be selected between medical device standard and mass market standard, and how to control the false alarm probability to fit the individualized requirements. To deal with these problems, we think it is a reasonable design to combine micro sensors with an ambulatory daily using device which has a common network interface, and adjust the classification parameters via a remote server. In this paper, we embed a tri-axial accelerometer in a cellphone, connect to Internet via the wireless channel, and using 1-Class SVM (Support Vector Machine) algorithm for the pre-processing, KFD (Kernel Fisher Discriminant) and k-NN (Nearest Neighbour) algorithm for the precise classification. And there were 32 volunteers, 12 elders (age 60-80) and 20 younger (age 20-39), attended our experiments, the results show that this method can detect the falls effectively and make less disturbance to people’s daily living than the general wearable sensor based fall detection systems. Key words: Accelerometer, Cellphone, Fall detection,1-Class SVM, KFD.

A Guide to dynamic Load balancing in Distributed Computer Systems

by Ali M. Alakeel - International Journal of Computer Science and Network Security (IJCSNS , 2010
"... Load balancing is the process of redistributing the work load among nodes of the distributed system to improve both resource utilization and job response time while also avoiding a situation where some nodes are heavily loaded while others are idle or doing little work. A dynamic load balancing algo ..."
Abstract - Cited by 14 (0 self) - Add to MetaCart
Load balancing is the process of redistributing the work load among nodes of the distributed system to improve both resource utilization and job response time while also avoiding a situation where some nodes are heavily loaded while others are idle or doing little work. A dynamic load balancing algorithm assumes no a priori knowledge about job behavior or the global state of the system, i.e., load balancing decisions are solely based on the current status of the system. The development of an effective dynamic load balancing algorithm involves many important issues: load estimation, load levels comparison, performance indices, system stability, amount of information exchanged among nodes, job resource requirements estimation, job’s selection for transfer, remote nodes selection, and more. This paper presents and analyses the aforementioned issues that need to be considered in the development or study of a dynamic load balancing algorithm. Keywords: Distributed computer systems; communication networks; load balancing; load sharing; performance evaluation; stability. 1.

A Performance Comparison of Proactive and Reactive Routing Protocols of Mobile Ad-hoc Network (MANET

by Md. Saiful Azad, Farhat Anwar, Md. Arafatur Rahman, Aisha H. Abdalla, Akhmad Unggul Priantoro, Omer Mahmoud - Journal of Engineering and Applied Sciences
"... Multicast routing is a key technology for modern communication networks. It sends a single copy of a message from a source to multiple receivers over a communication link that is shared by the paths to the receivers. This is especially appropriate in wireless environments where bandwidth is scarce a ..."
Abstract - Cited by 14 (3 self) - Add to MetaCart
Multicast routing is a key technology for modern communication networks. It sends a single copy of a message from a source to multiple receivers over a communication link that is shared by the paths to the receivers. This is especially appropriate in wireless environments where bandwidth is scarce and many users are sharing the same wireless channels. In particular, for WMNs, multicast can represent a huge enhancement of the network capacity by taking advantage of links which can be shared by multiple users to receive the same data, which is transmitted only once. To support multicasting, several multicast routing protocols are designed for Internet and Ad hoc networks. However, no specific multicast routing protocol is designed for WMNs. Therefore, the performance comparison of existing multicast routing protocols over wireless mesh networks is essential in order to analyze their behavior and effectiveness. This paper presents the simulation and analysis of the performance of existing proactive and reactive multicast routing protocols over WMNs. Three prominent multicast routing protocols are selected for performance comparison; they are On
Next 10 →
Results 1 - 10 of 2,521
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2018 The Pennsylvania State University