Notice Board :

Call for Paper
Vol. 11 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 20, 2024

Final MenuScript Due:
April 28, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 11 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 20, 2024      Final MenuScript Due: April 28, 2024      Publication Date: April 30, 2024




Volume II Issue VI

Author Name
Priti Sonare, Sumit Dhariwal, Megha Kamble
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
The rapidity of the processes and therefore the quantity of knowledge while not abundant automation can\'t be controlled by humans to be utilized in the cyberspace defense. and all , it effectively shield against network attacks for dynamic (at the extent of decision-making logic hardwired) to develop software package with ancient set of algorithms is difficult. . SQL Injection attacks on net applications that square measure susceptible to varied input functions. SQL injection suspect code or knowledge in an exceedingly net application is injected items revelation of personal data, the believability of the collection of information’s, theft and assault class belongs to the fishing grounds.
PaperID
2015/IJTRM/6/2015/5209

Author Name
Mrs. N. B. Divya, Mr. P. Hariharan
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
We consider a multiple access relay network where multiple sources send independent data to a single destination through multiple relays, which may inject falsified data into the network. To detect the malicious relays and discard (erase) data from them, tracing bits are embedded in the information data at each source node. In addition, parity bits are added to correct the errors caused by fading and noise. When the total amount of redundancy, tracing bits plus parity bits, is fixed, an increase in parity bits to increase the reliability requires a decrease in tracing bits, which leads to a less accurate detection of malicious behavior of relays, and vice versa. We investigate the tradeoff between the tracing bits and the parity bits in minimizing the probability of decoding error and maximizing the throughput in multisource, multi relay networks under falsified data injection attacks.
PaperID
2015/IJTRM/6/2015/5222

Author Name
Amit Kisan Pagare, Vijay Kumar Verma
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
Classifications is one of the important data mining techniques. In we construct model to describe data classes. The derived model used training data set. New and better techniques are developed for data mining and to discover unknown pattern form historical data. Some of these Models are useful for medical practitioners to take better and successful decision. Heart attack is one of the important problems in medical science. Early predicting heart attack symptoms are an important issue. In this paper we represent comparative study over various data mining classification techniques like Neural Network Decision Tree, Bayesian Classification, and Classification by back propagation, Support Vector Machines (SVM), k- Nearest Neighbor and Genetic Algorithms (GA).
PaperID
2015/IJTRM/6/2015/5235

Author Name
Ankita Rathore, Dr. Rajiv Srivastava
Year Of Publication
2015
Volume and Issue
Volume 2 Issue 6
Abstract
Mobile Ad hoc Network (MANET) is a network of mobile nodes that nodes link to each other for a period of time to exchange information. MANET can be creating anywhere because there is no requirement of infrastructure prepared the nodes to organize them into a network and establish routes for a communication. Rushing attack comes under the category of reactive routing protocol. They divert the route discovery process to another route, attacker quickly forwards the route request before the other nodes, and data firstly reach to the destination node forwarded by attacker node. In this research we provide a mechanism which is helpful to prevent the network from rushing attack as well as to detect the rushing attack on Ad Hoc On-Demand Distance Vector (AODV) and Dynamic Source Routing (DSR) protocol. The network parameters like number of hops per route, route discovery time and routing traffic sent and received.
PaperID
2015/IJTRM/6/2015/5251