6 research outputs found

    An Intrusion Detection System Algorithm for Defending MANET against the DDoS Attacks.

    Get PDF
    Mobile ad hoc network (MANET) is rapidly deployable, self configuring network able to communicate with each other without the aid of any centralized system. There is no need for existing infrastructure base network. In MANET Wireless medium is radio frequencies and nodes are mobile, topology can be very dynamically. Nodes must be able to relay traffic since communicating nodes might be out of range. A MANET can be a standalone network or it can be connected to external networks like internet. Multihop operation of MANET requires a routing mechanism designed for mobile nodes are internet access mechanisms, self configuring networks requires an address allocation mechanism, mechanism to detect and act on, merging of existing networks and security mechanisms. As we know that there is no any centralized system so routing is done by node itself. Due to its mobility and self routing capability nature, there are many weaknesses in its security

    A Run-time Detection System for Malicious URLs in Twitter

    Get PDF
    Twitter is web based application which provide the service of sharing and mentioning the tweets and messages, which is social networking service. Twitter message could be a context information, or a URLs. Spam, scam, malicious distribution can be done easily with these URLs, spams and malicious data are usually a suspicious URLs with share another URLs in it. These URLs are known as URLs redirect chains, it is a repetition URLs. They itself contain too many URLs which is called as spam URLs. Generally there are several schemes to find such spam URLs, and they are evasion using time – based and evasion using crawling. This system is design to find- detect such spam or suspicious URLs- tweets from many other tweets, The URLS redirect chains frequently share the same URLs, and have been reused usually by attackers because they have limited resources. A Run-time Detection System for Malicious URLs in Twitter has method to show and detect the suspiciousness of the correlated URLs redirect chains, which are commonly shared URLs. DOI: 10.17762/ijritcc2321-8169.15013

    Information Searching Using Web Data Extraction for Acquiring Enrich MM Results

    Get PDF
    There are many question answer sites are available now a day. In that Community Question Answering Sites are achieved lots of popularity over last years. But the drawback of available question answering system is that it can only provide multiple solutions of the textual answer and user need to select one of them. In this paper, we propose a scheme that enriches the textual answer with multimedia data. Our scheme consists of four models: QA pair extraction, answer medium selection, query generation and selection and presentation. The type media information added with the textual data is determined. The question answer pair is generated from the available Community Question Answering Sites database. Query is generated for the multimedia data. The final resulting data must be selected after re-ranking and removal operation and then present to the user. DOI: 10.17762/ijritcc2321-8169.15014

    Multi-Language based Android Application for Motor Control

    Get PDF
    some wise individual once aforementioned that system could be a system wherever we will finish off the machine whenever we'd like. That’s the distinction between controlled and uncontrolled system. Our project is regarding create this system economical and dynamic. Because the name instructed the automated management is for dominant the motor from remote place, look over its operational conditions; get feedback from the motor itself. Our target is to manage the motor from distant place by mobile DTMF tone and conjointly get feedback by SMS whereas it's in ON or OFF condition. We tend to conjointly make sure the safe operation of the motor by police investigation the voltage of the supply and guarantee feedback from system whereas it's over or below voltage. Once more we tend to conjointly get these feedbacks by SMS additionally. GSM network is all over in our country that’s why we decide GSM network to control our motor conjointly transferring feedback data through it. We tend to conjointly use GSM network as a result of if we tend to use it then we tend to don’t have to be compelled to establish further instrumentation for networking. To transmit feedback signals we tend to use GSM electronic equipment at the motor finish conjointly generate management signal by mobile DTMF as a result of it's terribly simple to get DTMF by mobile station and send feedback SMS by electronic equipment additionally. In industrial sector we tend to hope our project is become handy and value effective to control motor and provides its protection

    Avoid duplicate key overheads for same data in storage

    Get PDF
    De-duplication is a technique used to weaken the amount of storage needed by service providers. Now a day the most originating challenge is to perform secure de-duplication in cloud storage. Although convergent encryption has been extensively adopted for secure de-duplication, a demanding issue of making convergent encryption practical is to efficiently and reliably managea massive number of convergent keys. We first introduce a baseline approach in which each user holds an autonomous master key forencrypting the convergent keys and outsourcing them to the server. As a proof of concept, encompass the implementation framework of proposed authorized duplicate check scheme and conduct experiments using these prototype. In proposed system involve authorized duplicate checkscheme sustain minimal overhead compared to normal operations.De-duplication is one of important data compression techniques for eliminating duplicate copies of repeating data. For that purpose Authorized duplication check system is used. This paper addresses problem of privacy preserving de-duplication in cloud computing and introduce a new de-duplication system supporting for Differential Authorization, Authorized Duplicate Check, Unfeasiblity of file token/duplicate-check token, In distinguishability of file token/duplicate-check token, Data affinity.In this project we are presenting the certified data de-duplication toprotect the data security by counting differential privileges of users in the duplicate check.Different new de-duplication constructions presented for supporting authorized duplicate check

    International Journal on Recent and Innovation Trends in Computing and Communication Information Searching Using Web Data Extraction for Acquiring Enrich MM Results

    No full text
    Abstract-There are many question answer sites are available now a day. In that Community Question Answering Sites are achieved lots of popularity over last years. But the drawback of available question answering system is that it can only provide multiple solutions of the textual answer and user need to select one of them. In this paper, we propose a scheme that enriches the textual answer with multimedia data. Our scheme consists of four models: QA pair extraction, answer medium selection, query generation and selection and presentation. The type media information added with the textual data is determined. The question answer pair is generated from the available Community Question Answering Sites database. Query is generated for the multimedia data. The final resulting data must be selected after re-ranking and removal operation and then present to the user
    corecore