Call for Comming Issue

Volume 1, Issue 3 August 2013

S.No. Title Page No.
An effective approach that's used the thought of bunch for implementing the k-anonymity
Dr. V. K. Gupta
Abstract : Data mining technology has curious about means that of distinctive patterns and trends from giant collections of information. it's but evident that the gathering and analysis knowledge|of knowledge|of data} that embody personal information might violate the privacy of the people to whom data refers. The k-anonymity model is one in every of the foremost best-known novel privacy conserving approaches that are extensively studied for the past few years. during this paper, effective approach that's used the thought of bunch for implementing the k-anonymity is proposed; the goal of this approach is preserved privacy of information with less effectiveness on data processing results. a group of experiments were allotted on the info of the UC Irvine machine learning repository. The obtained results show that the planned methodology keeps knowledge privacy preservation with terribly low impact on accuracy of information mining results compared with greedy k-member and one pass k-means algorithms.
Analysis for real time implementation of packet telecommunication over mobile ad-hoc network
Mr. Mayank Verma, Ms. Payal Goyal
Abstract: Successful implementation of Packet telecommunication over a mobile ad-hoc network has been a subject of analysis interest for a few time currently. One major deterrent to success of any viable resolution ar varied ‘denial of service’, DoS, attacks launched by the malicious node(s). productive implementation of packet telecommunication is subject to restriction obligatory by varied ‘quality-of-service’, QoS, parameters together with packet delivery magnitude relation (PDR). During this work authors have analysed the adverse result that denial of service attacks will wear packet delivery magnitude relation. This analysis ought to sway be useful in real time implementation of packet telecommunication over mobile ad-hoc network.
A technique based Earthquake injury assessment using image modification detection primarily
Mr. Deepak Sahay
Abstract: The work given here thinks about with the matter of Earthquake injury assessment victimisation multi temporal satellite pictures. Remotely perceived information will offer valuable data for disaster assessment like Earthquakes, Volcanic Eruptions, Landslides, Floods, Storm Surge, Hurricanes, Fires and Drought etc. Earthquake is one in all the inescapable natural hazards that cause countless damages and issues to the economy, surroundings and therefore the whole lifetime of individuals. bar of earthquake isn't achieved and such events still cause increasing threat to life and property. once the earthquakes, there's a desire for speedy, correct and reliable injury data within the crucial post event hours to guide response activities. The results generated by the planned technique square measure quite promising as compared to different modification detection ways and square measure useful for precise earthquake injury assessment.
An Experimental System of redundancy for be a fault tolerant system based on Real-Time system
Oyal Tornoo, Keth Thamas
Abstract: Real-Time system could be a system that point of response to jobs play a awfully necessary role. Owing to time limitations, fault tolerance mechanism in period of time digital computer systems is very necessary. During this quite systems the fault ought to be discovered and be repaired as before long as potential to let the roles square measure completed in determined point in time. The desired system wants redundancy for be a fault tolerant system. One in all the redundancy sorts is software package redundancy. The special quite software package redundancy is "Primary Backup" that's used for programming real time digital computer systems. During this paper 3 new approaches for programming jobs in real time, fault tolerance systems is reviewed. Additionally we have a tendency to make a case for advantages and downsides of every approach square measure explained. Finally these approaches are compared.
A framework for wave files that cut back the noise by applying quick Fourier Transformation (FFT)
Mr. Anil Dubey, Dr. K. K. Sharma
Abstract: The motivation for this analysis work includes the supply of protection of material possession rights, a sign of content manipulation, and a way of protective digital media from change of state and every one this while not touching the standard of information. A brand new theme is projected for wave files that cut back the noise by applying quick Fourier Transformation (FFT) and taking random carrier to imbed the watermark into the audio bit stream rather than mounted or low frequency carrier. The new theme has enforced and its audio quality parameters area unit compared to the opposite best proverbial audio watermarking technique. Comparison has been done on the premise of Peak Signal to Noise quantitative relation, Signal to Noise quantitative relation and Bit Error Rate. The comparison proves that the projected technique provide higher results. Comparison is finished with best apprehend associate degree adaptational watermarking rule for Mp3 compressed Audio Signal techniques proves that the projected and enforced rule for audio watermarking provides higher results.
A study of security attacks on bootstrapping and cache consistency and propose schemes for intrusion detection, harm recovery and trespasser identification
Ms. Usha Rani, Ms. Monika Gotam
Abstract: Bootstrap security theme is capitalizing neighbor node relationship and share data of alternative nodes in dynamic Edouard Manet. During this paper, we have a tendency to determine attainable security attacks on bootstrapping and cache consistency and propose schemes for intrusion detection, harm recovery and trespasser identification. we have a tendency to conjointly address alternative security problems in cooperative cache based mostly information access. Also, we have a tendency to propose an answer supported the improved IR-based cache dissolution and bootstrapping strategy to forestall intruders from dropping or modifying the dissolution messages. Digital signatures may be wont to shield federal agency however it\'s considerably high overhead in terms of computation and information measure consumption. To rectify this downside, we have a tendency to propose dissolution based mostly bootstrapping and cache consistency schemes for intrusion detection and harm recovery. Experimental simulation is dispensed to guage the planned schemes. Our theme will considerably improve the output and cut back the question latency, the quantity of transmission request, and therefore the broadcast information measure necessities.





©  2010 All Rights Reserved to IPASJ