Notice Board :

Call for Paper
Vol. 5 Issue 10

Submission Start Date:
Oct 01, 2018

Acceptence Notification Start:
Oct 10, 2018

Submission End:
Oct 15, 2018

Final MenuScript Due:
Oct 30, 2018

Publication Date:
Nov 01, 2018
                         Notice Board: Call for PaperVol. 5 Issue 10      Submission Start Date: Oct 01, 2018      Acceptence Notification Start: Oct 10, 2018      Submission End: Oct 15, 2018      Final MenuScript Due: Oct 30, 2018      Publication Date: Nov 01, 2018




Volume II Issue VI

Author Name
Priti Sonare, Sumit Dhariwal, Megha Kamble
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
The rapidity of the processes and therefore the quantity of knowledge while not abundant automation can\'t be controlled by humans to be utilized in the cyberspace defense. and all , it effectively shield against network attacks for dynamic (at the extent of decision-making logic hardwired) to develop software package with ancient set of algorithms is difficult. . SQL Injection attacks on net applications that square measure susceptible to varied input functions. SQL injection suspect code or knowledge in an exceedingly net application is injected items revelation of personal data, the believability of the collection of information’s, theft and assault class belongs to the fishing grounds.
PaperID
2015/IJTRM/6/2015/5209

Author Name
Mrs. N. B. Divya, Mr. P. Hariharan
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may inject falsified data into the network. To detect the malicious relays and discard (erase) data from them, tracing bits are embedded in the information data at each source node. In addition, parity bits are added to correct the errors caused by fading and noise. When the total amount of redundancy, tracing bits plus parity bits, is fixed, an increase in parity bits to increase the reliability requires a decrease in tracing bits, which leads to a less accurate detection of malicious behavior of relays, and vice versa. We investigate the tradeoff between the tracing bits and the parity bits in minimizing the probability of decoding error and maximizing the throughput in multisource, multi relay networks under falsified data injection attacks.
PaperID
2015/IJTRM/6/2015/5222

Author Name
Amit Kisan Pagare, Vijay Kumar Verma
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
Classifications is one of the important data mining techniques. In we construct model to describe data classes. The derived model used training data set. New and better techniques are developed for data mining and to discover unknown pattern form historical data. Some of these Models are useful for medical practitioners to take better and successful decision. Heart attack is one of the important problems in medical science. Early predicting heart attack symptoms are an important issue. In this paper we represent comparative study over various data mining classification techniques like Neural Network Decision Tree, Bayesian Classification, and Classification by back propagation, Support Vector Machines (SVM), k- Nearest Neighbor and Genetic Algorithms (GA).
PaperID
2015/IJTRM/6/2015/5235

Author Name
Ankita Rathore, Dr. Rajiv Srivastava
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
Mobile Ad hoc Network (MANET) is a network of mobile nodes that nodes link to each other for a period of time to exchange information. MANET can be creating anywhere because there is no requirement of infrastructure prepared the nodes to organize them into a network and establish routes for a communication. Rushing attack comes under the category of reactive routing protocol. They divert the route discovery process to another route, attacker quickly forwards the route request before the other nodes, and data firstly reach to the destination node forwarded by attacker node. In this research we provide a mechanism which is helpful to prevent the network from rushing attack as well as to detect the rushing attack on Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol. The network parameters like number of hops per route, route discovery time and routing traffic sent and received.
PaperID
2015/IJTRM/6/2015/5251