Learn More
In this research, anomaly detection using neural network is introduced. This research aims to experiment with user behaviour as parameters in anomaly intrusion detection using a backpropagation neural network. Here we wanted to see if a neural network is able to classify normal traffic correctly, and detect known and unknown attacks without using a huge(More)
Searching and comparing products satisfying buyer's preferences is one of the essential activities in e-commerce. It is difficult when product space is large and multiple criteria on the product features are to be considered. Furthermore, the matchmaking becomes a challenging problem if buyer's preferences are fuzzy. In this paper, we present a linguistic(More)
We propose a multi-objective Pareto-optimal technique using Genetic Algorithm (GA) for group communication , which determines a min-cost multicast tree satisfying end-to-end delay, jitter, packet loss rate and blocking probability constraints. The model incorporates a fuzzy-based selection technique for initialization of Quality of Service (QoS) parameter(More)
The increasing demand of real-time multimedia applications in wireless environment requires stringent Quality of Service (QoS) provisioning to the Mobile Hosts (MI. The scenario becomes more complex during group communication from single source to multiple destinations. Fulfilling users demand with respect to delay, jitter, available bandwidth, packet loss(More)
One of the core idea of Service Oriented Architecture is the generation of new applications by composing existing services that are available on the web. Several approaches have been proposed to handle the problem of web service composition, but little effort has been devoted so far to the problem of consumer requirement oriented automatic service selection(More)
In many occasions citizens have to interact with multiple government organizations to complete a task which may involve lot of manual effort. In order to streamline the task different governments have adopted e-governance. But this has raised the issue of interoperability. In recent years web services seems to provide a solution towards interoperability(More)
In the development of wireless sensor networks (WSNs) applications, organizing sensor nodes into a communication network and route the sensed data from sensor nodes to a remote sink is a challenging task. Energy efficient and reliable routing of data from the source to destination with minimal power consumption remains as a core research problem. So, in WSN(More)
Scheduling number of jobs in a single machine is a “Uni-machine job scheduling problem”. The mean of variation of job's waiting time is called Waiting time Variance (WTV). Minimization of WTV directly improves the quality of service (QoS) of systems involved with job scheduling. WTV minimization is a NP-hard problem. As a matter of fact(More)
With overwhelming use of Internet, security in Cyberspace has become a prime concern. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic(More)