Mohammed Abdul Waheed - Academia.edu (original) (raw)
Papers by Mohammed Abdul Waheed
Until making an educated buying decision online reviews have become a significant source of infor... more Until making an educated buying decision online reviews have become a significant source of information for consumers. Early evaluation of a product appears to have a major effect on subsequent sales of the product. In this paper, through their posted reviews on two real-world major E-commerce sites, we take the initiative to research the behavioral characteristics of early reviewers. In particular, we divide the lifetime of the commodity into three consecutive phases, namely early, majority and laggards. A user who initially posted a review is considered an early reviewer. Based on their rating habits, the helpfulness ratings earned from others and the association of their feedback with product popularity, we quantitatively classify early reviewers. We proposed here, the product review content is taken into account in terms of a contribution isn’t merely a sales message to promote a product you love; instead, a balanced product review will indicate the execs and cons of a given pro...
International Journal of Engineering and Advanced Technology, 2020
Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer re... more Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community's public key is changed to avoid abuse.
IJARCCE, 2015
NC-Cloud is a proof of concept prototype of a network coding based storage system that aims at pr... more NC-Cloud is a proof of concept prototype of a network coding based storage system that aims at providing fault tolerance and reducing data repair cost when storing storage using multiple cloud storage. To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We design a proxy based storage system for fault tolerant multiple cloud storage called NC-Cloud, which achieves reduction in repair traffic for a permanent multi-cloud failure. NC-Cloud is built on top of a network-coding-based storage scheme called regenerating codes. Specifically we propose an implementable design for the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, having comparable response time performance in normal cloud storage operations such as upload/download.
2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC), 2021
In the Indian economy, Agriculture is considered one of the strongest pillars. Agriculture sector... more In the Indian economy, Agriculture is considered one of the strongest pillars. Agriculture sector contributes significantly in our country, and it provides employability to many people live in a rural area. In our work, various methods of image processing are utilized for detecting healthy or unhealthy paddy leaves. This paper aims to carry out image analysis & classification methods to detect paddy leaf diseases and classification. We have built a system using image processing for identifying spots in paddy images by applying segmentation techniques. This system mainly includes four components: pre-processing, segmentation to extract the infected region by adopting FCM and SLIC algorithm, Feature Extraction using statistical Gray-Level Co-Occurrence Matrix (GLCM) features, and color features are extracted using HSV planes. Finally, Classification is made by using an artificial neural network (ANN).
2017 International Conference on Intelligent Computing and Control Systems (ICICCS), 2017
Mobile Ad hoc Network (MANET) is one of the most popular dynamic topology reconfigurable local wi... more Mobile Ad hoc Network (MANET) is one of the most popular dynamic topology reconfigurable local wireless network standards. Distributed Denial of Services is one of the most challenging threats in such a network. Flooding attack is one of the forms of DDoS attack whereby certain nodes in the network miss-utilizes the allocated channel by flooding packets with very high packet rate to it's neighbors, causing a fast energy loss to the neighbors and causing other legitimate nodes a denial of routing and transmission services from these nodes. In this work we propose a novel link layer assessment based flooding attack detection and prevention method. MAC layer of the nodes analyzes the signal properties and incorporated into the routing table by a cross layer MAC/Network interface. Once a node is marked as a flooding node, it is blacklisted in the routing table and is communicated to MAC through Network/MAC cross layer interface. Results shows that the proposed technique produces more accurate flooding attack detection in comparison to current state of art statistical analysis based flooding attack detection by network layer.
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data re... more Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web.However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capabilities. The privacy model allows a service to define a privacy policy and a set of privacy requirements. We also propose a privacy-preserving DaaS composition approach allowing to verify the compatibility between privacy requirements and policies in DaaS composition. We propose a negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition. We validate the applicability of our proposal through a prototype implementation and a set of experiments.
2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020
Centered on its inherent data sharing and low latency features, cloud infrastructure is considere... more Centered on its inherent data sharing and low latency features, cloud infrastructure is considered as an effective alternative to conventional information technology. Cloud service providers (CSPs) like Amazon, are capable of providing cloud users with various services by integrating the powerful data centers. Users may utilize high-quality software to move their local data processing systems to cloud storage and save considerable investments in their local infrastructures. Annotation techniques by utilizing the pairs of meaning attributes are usually more descriptive, as they provide more details than the untyped methods. A new solution to use more concise queries with such annotations is the “pay-as-you-go” querying technique in data spaces.
Attacks Recognition countenances numerous challenge s. An attack recognition system should depend... more Attacks Recognition countenances numerous challenge s. An attack recognition system should dependably recognize spiteful tricks within a network or net s ups and should carry out operations proficiently to cope up with huge congestion on network. This paper deals with s tudy of 2 problem concerning Accurateness and Profi ciency of applications vulnerable to attacks and provide solu tion to it through Restricted Fields and Multi Auth entication Mechanism. We would study and discuss that the elev ated attack recognition accurateness could be attai ned though Restricted Fields and elevated proficiency by apply ing the Multi Authentication Mechanism. Our propose d concept of system would be able to recognize 4 different ty pes of attacks very effectively. The attacks to dea l we consider in our concept are DoS attack, User2Root attack, Probe attack and R2L (SQL Injection) attack. At last, we pr sent that our concept system is powerful enough to deal with suspicious data or actions witho...
Grid computing is believed to be ultimate solution for meeting the increasing computation needs o... more Grid computing is believed to be ultimate solution for meeting the increasing computation needs of organizations. At present the major focus is on load balancing in Grid computing in order to improve the performance of grid. However, the user running an application on a remote machine in the grid-computing network requires assurance about privacy and integrity of his data. Similarly the local host requires a similar assurance regarding the client data and processes that run on the host. So the focus must be on the security of data and applications along with the high performance of the grid. The purpose of this paper is to explore the security problems in grid computing and the steps that can be taken to solve them General Terms: Performance, Reliability, Security
In recent years the Internet has been transformed from a special purpose network to a ubiquitous ... more In recent years the Internet has been transformed from a special purpose network to a ubiquitous platform for a wide range of everyday communication services. It is observed that link failures occur as part of everyday operation, and the majority of them are short-lived (less than 10 minutes). This paper presents a detailed study of effects and causes and impact of link failures in TCP/IP network. We also discuss various statistics such as the, distribution of inter-failure time, distribution of link failure durations, classification of link failures etc. which are essential for constructing a realistic no- link failure model.
In a single link network architecture if a link fails, system hunts for the substitute link and t... more In a single link network architecture if a link fails, system hunts for the substitute link and transmits the data through that link. It is always necessary for system to search the reason for path break then configure the system again to transmit the data through other path/node. But during the transmission there are more chances of packet loss or delay. In this paper we propose a mechanism to overcome from the packet loss or delay problem such that if any node or path breakdowns, it will assist in transmission of data without any packet loss or delay.
International Journal of Engineering Trends and Technology, 2019
In a world filled with data, it is expected for a nation to take decisions informed by data. Howe... more In a world filled with data, it is expected for a nation to take decisions informed by data. However, countries need to first collect and publish such data in a way meaningful for both citizens and policy makers. A good thematic classification could be instrumental in helping users to navigate and find the right resources on a rich data repository, such as the one collected by the DANE (Departamento Administrativo Nacional de Estadística, i.e. the Colombia's National Administrative Department of Statistics). The Visual Analytics Framework is a methodology for conducting visual analysis developed by T. Munzner et al.1 that could help with this task. This paper presents a case study applying such framework conducted to help the DANE to better visualize their data repository, and also to understand it better by using another classification extracted from its metadata. It describes the three main analysis tasks identified and the proposed solutions. Usability testing results during the process helped to correct the visualizations and make them adapted to decision-making. Finally, we explained the collection of insights generated from them.
IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important st... more IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important step in fixing bugs; its aim is to correctly assign a developer to new bug. To reduce time, text classification methods are adapted to perform automatic bug triage. Here, we concentrate on how to minimize the scale and improvement of quality of bug data. We combine instance selection with feature selection to reduce data size on the bug dimension and the word dimension simultaneously. Attributes from historical bug datasets is collected for determining the order to be applied for instance and feature selection, predictive model is implemented for a new bug data set. Our contribution results in reduced and high-quality bug data.
Proceedings of the Fist International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India, 2021
IoT based connections are common in new era of communication and henceforth, an over sight of ana... more IoT based connections are common in new era of communication and henceforth, an over sight of analysis is required to be viewed on challenges occurred under transmission channel. In this paper, a new technique is developed to assure the safer transmission of data via IoT devices connected using Delay Tolerant Network (DTN). Typically, the technique aims to detect blackhole and Grayhole attack and hostage nodes to assure early detection. The technique is first of its kind in IoT devices. The experimental results of technique are evaluated using a real-time IoT MSP431 module and the result demonstrates an accuracy of 96.07% of detection under a 64 cluster node environment of WSN.
Lecture Notes in Networks and Systems, 2022
Coding-based solutions for MANETs have emerged as a basic solution to current high rate data acce... more Coding-based solutions for MANETs have emerged as a basic solution to current high rate data accessing in adhoc network. This has become essential related to the absence of centralized control such as a monitoring station. A code assignment protocol is needed to assign distinct codes to different terminals. This problem is less effective in small networks, but becomes dominative in large networks where the numbers of code sequence are lesser than the number of terminals to code, demanding reuse of the codes. The issue of code allocation in communication is focused in this paper with the evaluation of MAI in wireless network. Unlike previously proposed protocols in this paper a focus for the multiple access interference (MAI), thereby addressing the limiting near-far problem that decreases the throughput performance in MANETs is made. The code assignment scheme is developed for the proper usage of users code under MANETs communication to minimize the MAI impact.
IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important st... more IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important step in fixing bugs; its aim is to correctly assign a developer to new bug. To reduce time, text classification methods are adapted to perform automatic bug triage. Here, we concentrate on how to minimize the scale and improvement of quality of bug data. We combine instance selection with feature selection to reduce data size on the bug dimension and the word dimension simultaneously. Attributes from historical bug datasets is collected for determining the order to be applied for instance and feature selection, predictive model is implemented for a new bug data set. Our contribution results in reduced and high-quality bug data.
Grid computing is one of the fastest emerging techn ologies within the high performance computing... more Grid computing is one of the fastest emerging techn ologies within the high performance computing environment.Grid deployments that require access and processing of data are called data grids. They ar e optimized for data oriented operation. In a data grid environ ment, data replication is an effective way to impro ve data accessibility. Here data partitioning and dynamic r eplication in data grid are considered. In which se curity and access performance of a system are efficient. There are several important requirements for data grids, including information survivability, security, and access per formance. More specifically, the investigation is t he problem of optimal allocation of sensitive data objects that a re partitioned by using secret sharing scheme or er asure coding scheme and replicated. DATA PARTITIONING is known as the single data can be divided into multiple obje cts. REPLICATION is known as process of sharing information (i.e.) storing same data in multiple systems. ...
A self-protection technique is suggested for adhoc network fall short of the objective of data pr... more A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for selfmonitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.
2017 International Conference on Intelligent Computing and Control Systems (ICICCS), 2017
Delay in long network transmission is a major challenge for lossless connection, Delay Tolerant N... more Delay in long network transmission is a major challenge for lossless connection, Delay Tolerant Networks (DTN) are designed to overcome the same. Due to the limited connectivity, DTN are exposed towards Blackhole and GrayHole attacks with intentionally dropping a segment of data under transmission towards the receiver node. In this paper, a Statistical-based Detection for GrayHole and BlackHole attackers(SbDGB) is addressed with an collision attack detection and individual attack detection under dual mode verification and justification technique. Simulation shows that, SbDGB can be appended over various dropping probabilities and various attackers rate per collision with higher accuracy of detection and alerting rate with lower false positive predictions.
Until making an educated buying decision online reviews have become a significant source of infor... more Until making an educated buying decision online reviews have become a significant source of information for consumers. Early evaluation of a product appears to have a major effect on subsequent sales of the product. In this paper, through their posted reviews on two real-world major E-commerce sites, we take the initiative to research the behavioral characteristics of early reviewers. In particular, we divide the lifetime of the commodity into three consecutive phases, namely early, majority and laggards. A user who initially posted a review is considered an early reviewer. Based on their rating habits, the helpfulness ratings earned from others and the association of their feedback with product popularity, we quantitatively classify early reviewers. We proposed here, the product review content is taken into account in terms of a contribution isn’t merely a sales message to promote a product you love; instead, a balanced product review will indicate the execs and cons of a given pro...
International Journal of Engineering and Advanced Technology, 2020
Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer re... more Cloud is now widely used for the remote storage of data; it’s an On-demand device and computer resource configuration process. This allows users to avoid locally saving and storing data. Remote data sharing is an inexpensive and effective way to share cloud users community resources. DiffieHellman used the previous approach to protect multi-owner cloud sharing for distributed groups. In the existing system, there is a community signature shared among all group members that contributes to the middle attack. The program suggested using the LFSR-dependent correlation method, which primarily used handshake protocol to safely exchange community signature to detect the attack, to detect an attack. If the calculated value exceeds one (value>1), the community's public key is changed to avoid abuse.
IJARCCE, 2015
NC-Cloud is a proof of concept prototype of a network coding based storage system that aims at pr... more NC-Cloud is a proof of concept prototype of a network coding based storage system that aims at providing fault tolerance and reducing data repair cost when storing storage using multiple cloud storage. To provide fault tolerance for cloud storage, recent studies propose to stripe data across multiple cloud vendors. However, if a cloud suffers from a permanent failure and loses all its data, we need to repair the lost data with the help of the other surviving clouds to preserve data redundancy. We design a proxy based storage system for fault tolerant multiple cloud storage called NC-Cloud, which achieves reduction in repair traffic for a permanent multi-cloud failure. NC-Cloud is built on top of a network-coding-based storage scheme called regenerating codes. Specifically we propose an implementable design for the functional minimum-storage regenerating (FMSR) codes, which maintain the same fault tolerance and data redundancy as in traditional erasure codes (e.g., RAID-6), but use less repair traffic. We validate that FMSR codes provide significant monetary cost savings in repair over RAID-6 codes, having comparable response time performance in normal cloud storage operations such as upload/download.
2021 IEEE International Conference on Mobile Networks and Wireless Communications (ICMNWC), 2021
In the Indian economy, Agriculture is considered one of the strongest pillars. Agriculture sector... more In the Indian economy, Agriculture is considered one of the strongest pillars. Agriculture sector contributes significantly in our country, and it provides employability to many people live in a rural area. In our work, various methods of image processing are utilized for detecting healthy or unhealthy paddy leaves. This paper aims to carry out image analysis & classification methods to detect paddy leaf diseases and classification. We have built a system using image processing for identifying spots in paddy images by applying segmentation techniques. This system mainly includes four components: pre-processing, segmentation to extract the infected region by adopting FCM and SLIC algorithm, Feature Extraction using statistical Gray-Level Co-Occurrence Matrix (GLCM) features, and color features are extracted using HSV planes. Finally, Classification is made by using an artificial neural network (ANN).
2017 International Conference on Intelligent Computing and Control Systems (ICICCS), 2017
Mobile Ad hoc Network (MANET) is one of the most popular dynamic topology reconfigurable local wi... more Mobile Ad hoc Network (MANET) is one of the most popular dynamic topology reconfigurable local wireless network standards. Distributed Denial of Services is one of the most challenging threats in such a network. Flooding attack is one of the forms of DDoS attack whereby certain nodes in the network miss-utilizes the allocated channel by flooding packets with very high packet rate to it's neighbors, causing a fast energy loss to the neighbors and causing other legitimate nodes a denial of routing and transmission services from these nodes. In this work we propose a novel link layer assessment based flooding attack detection and prevention method. MAC layer of the nodes analyzes the signal properties and incorporated into the routing table by a cross layer MAC/Network interface. Once a node is marked as a flooding node, it is blacklisted in the routing table and is communicated to MAC through Network/MAC cross layer interface. Results shows that the proposed technique produces more accurate flooding attack detection in comparison to current state of art statistical analysis based flooding attack detection by network layer.
Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data re... more Data as a Service (DaaS) builds on service-oriented technologies to enable fast access to data resources on the Web.However, this paradigm raises several new privacy concerns that traditional privacy models do not handle. In addition, DaaS composition may reveal privacy-sensitive information. In this paper, we propose a formal privacy model in order to extend DaaS descriptions with privacy capabilities. The privacy model allows a service to define a privacy policy and a set of privacy requirements. We also propose a privacy-preserving DaaS composition approach allowing to verify the compatibility between privacy requirements and policies in DaaS composition. We propose a negotiation mechanism that makes it possible to dynamically reconcile the privacy capabilities of services when incompatibilities arise in a composition. We validate the applicability of our proposal through a prototype implementation and a set of experiments.
2020 Third International Conference on Smart Systems and Inventive Technology (ICSSIT), 2020
Centered on its inherent data sharing and low latency features, cloud infrastructure is considere... more Centered on its inherent data sharing and low latency features, cloud infrastructure is considered as an effective alternative to conventional information technology. Cloud service providers (CSPs) like Amazon, are capable of providing cloud users with various services by integrating the powerful data centers. Users may utilize high-quality software to move their local data processing systems to cloud storage and save considerable investments in their local infrastructures. Annotation techniques by utilizing the pairs of meaning attributes are usually more descriptive, as they provide more details than the untyped methods. A new solution to use more concise queries with such annotations is the “pay-as-you-go” querying technique in data spaces.
Attacks Recognition countenances numerous challenge s. An attack recognition system should depend... more Attacks Recognition countenances numerous challenge s. An attack recognition system should dependably recognize spiteful tricks within a network or net s ups and should carry out operations proficiently to cope up with huge congestion on network. This paper deals with s tudy of 2 problem concerning Accurateness and Profi ciency of applications vulnerable to attacks and provide solu tion to it through Restricted Fields and Multi Auth entication Mechanism. We would study and discuss that the elev ated attack recognition accurateness could be attai ned though Restricted Fields and elevated proficiency by apply ing the Multi Authentication Mechanism. Our propose d concept of system would be able to recognize 4 different ty pes of attacks very effectively. The attacks to dea l we consider in our concept are DoS attack, User2Root attack, Probe attack and R2L (SQL Injection) attack. At last, we pr sent that our concept system is powerful enough to deal with suspicious data or actions witho...
Grid computing is believed to be ultimate solution for meeting the increasing computation needs o... more Grid computing is believed to be ultimate solution for meeting the increasing computation needs of organizations. At present the major focus is on load balancing in Grid computing in order to improve the performance of grid. However, the user running an application on a remote machine in the grid-computing network requires assurance about privacy and integrity of his data. Similarly the local host requires a similar assurance regarding the client data and processes that run on the host. So the focus must be on the security of data and applications along with the high performance of the grid. The purpose of this paper is to explore the security problems in grid computing and the steps that can be taken to solve them General Terms: Performance, Reliability, Security
In recent years the Internet has been transformed from a special purpose network to a ubiquitous ... more In recent years the Internet has been transformed from a special purpose network to a ubiquitous platform for a wide range of everyday communication services. It is observed that link failures occur as part of everyday operation, and the majority of them are short-lived (less than 10 minutes). This paper presents a detailed study of effects and causes and impact of link failures in TCP/IP network. We also discuss various statistics such as the, distribution of inter-failure time, distribution of link failure durations, classification of link failures etc. which are essential for constructing a realistic no- link failure model.
In a single link network architecture if a link fails, system hunts for the substitute link and t... more In a single link network architecture if a link fails, system hunts for the substitute link and transmits the data through that link. It is always necessary for system to search the reason for path break then configure the system again to transmit the data through other path/node. But during the transmission there are more chances of packet loss or delay. In this paper we propose a mechanism to overcome from the packet loss or delay problem such that if any node or path breakdowns, it will assist in transmission of data without any packet loss or delay.
International Journal of Engineering Trends and Technology, 2019
In a world filled with data, it is expected for a nation to take decisions informed by data. Howe... more In a world filled with data, it is expected for a nation to take decisions informed by data. However, countries need to first collect and publish such data in a way meaningful for both citizens and policy makers. A good thematic classification could be instrumental in helping users to navigate and find the right resources on a rich data repository, such as the one collected by the DANE (Departamento Administrativo Nacional de Estadística, i.e. the Colombia's National Administrative Department of Statistics). The Visual Analytics Framework is a methodology for conducting visual analysis developed by T. Munzner et al.1 that could help with this task. This paper presents a case study applying such framework conducted to help the DANE to better visualize their data repository, and also to understand it better by using another classification extracted from its metadata. It describes the three main analysis tasks identified and the proposed solutions. Usability testing results during the process helped to correct the visualizations and make them adapted to decision-making. Finally, we explained the collection of insights generated from them.
IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important st... more IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important step in fixing bugs; its aim is to correctly assign a developer to new bug. To reduce time, text classification methods are adapted to perform automatic bug triage. Here, we concentrate on how to minimize the scale and improvement of quality of bug data. We combine instance selection with feature selection to reduce data size on the bug dimension and the word dimension simultaneously. Attributes from historical bug datasets is collected for determining the order to be applied for instance and feature selection, predictive model is implemented for a new bug data set. Our contribution results in reduced and high-quality bug data.
Proceedings of the Fist International Conference on Advanced Scientific Innovation in Science, Engineering and Technology, ICASISET 2020, 16-17 May 2020, Chennai, India, 2021
IoT based connections are common in new era of communication and henceforth, an over sight of ana... more IoT based connections are common in new era of communication and henceforth, an over sight of analysis is required to be viewed on challenges occurred under transmission channel. In this paper, a new technique is developed to assure the safer transmission of data via IoT devices connected using Delay Tolerant Network (DTN). Typically, the technique aims to detect blackhole and Grayhole attack and hostage nodes to assure early detection. The technique is first of its kind in IoT devices. The experimental results of technique are evaluated using a real-time IoT MSP431 module and the result demonstrates an accuracy of 96.07% of detection under a 64 cluster node environment of WSN.
Lecture Notes in Networks and Systems, 2022
Coding-based solutions for MANETs have emerged as a basic solution to current high rate data acce... more Coding-based solutions for MANETs have emerged as a basic solution to current high rate data accessing in adhoc network. This has become essential related to the absence of centralized control such as a monitoring station. A code assignment protocol is needed to assign distinct codes to different terminals. This problem is less effective in small networks, but becomes dominative in large networks where the numbers of code sequence are lesser than the number of terminals to code, demanding reuse of the codes. The issue of code allocation in communication is focused in this paper with the evaluation of MAI in wireless network. Unlike previously proposed protocols in this paper a focus for the multiple access interference (MAI), thereby addressing the limiting near-far problem that decreases the throughput performance in MANETs is made. The code assignment scheme is developed for the proper usage of users code under MANETs communication to minimize the MAI impact.
IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important st... more IT companies give over 45% of revenue in marketing with software bugs. Bug triage is important step in fixing bugs; its aim is to correctly assign a developer to new bug. To reduce time, text classification methods are adapted to perform automatic bug triage. Here, we concentrate on how to minimize the scale and improvement of quality of bug data. We combine instance selection with feature selection to reduce data size on the bug dimension and the word dimension simultaneously. Attributes from historical bug datasets is collected for determining the order to be applied for instance and feature selection, predictive model is implemented for a new bug data set. Our contribution results in reduced and high-quality bug data.
Grid computing is one of the fastest emerging techn ologies within the high performance computing... more Grid computing is one of the fastest emerging techn ologies within the high performance computing environment.Grid deployments that require access and processing of data are called data grids. They ar e optimized for data oriented operation. In a data grid environ ment, data replication is an effective way to impro ve data accessibility. Here data partitioning and dynamic r eplication in data grid are considered. In which se curity and access performance of a system are efficient. There are several important requirements for data grids, including information survivability, security, and access per formance. More specifically, the investigation is t he problem of optimal allocation of sensitive data objects that a re partitioned by using secret sharing scheme or er asure coding scheme and replicated. DATA PARTITIONING is known as the single data can be divided into multiple obje cts. REPLICATION is known as process of sharing information (i.e.) storing same data in multiple systems. ...
A self-protection technique is suggested for adhoc network fall short of the objective of data pr... more A self-protection technique is suggested for adhoc network fall short of the objective of data privacy, data integrity, and authentication. Various security standards such as IEEE 802.11i, WPA, IEEE 802.1X were suggested to enhance the security issues in 802.11.Despite their efficiency, these standards does not provide any security approach for monitoring of these authentication in a distributed architecture. For the efficient monitoring of the authentication issue in adhoc network, in this paper we present a self monitored security approach for selfmonitoring of key authentication for security protocol in adhoc networks. The processing overhead for the suggested approach is evaluated for a threshold based cryptographic approach.
2017 International Conference on Intelligent Computing and Control Systems (ICICCS), 2017
Delay in long network transmission is a major challenge for lossless connection, Delay Tolerant N... more Delay in long network transmission is a major challenge for lossless connection, Delay Tolerant Networks (DTN) are designed to overcome the same. Due to the limited connectivity, DTN are exposed towards Blackhole and GrayHole attacks with intentionally dropping a segment of data under transmission towards the receiver node. In this paper, a Statistical-based Detection for GrayHole and BlackHole attackers(SbDGB) is addressed with an collision attack detection and individual attack detection under dual mode verification and justification technique. Simulation shows that, SbDGB can be appended over various dropping probabilities and various attackers rate per collision with higher accuracy of detection and alerting rate with lower false positive predictions.