An enhanced security model for proxy signature schemes is formalized. In the new model, we consider chosen key and chosen warrant attacks which exist in real environment but were neglected in previous security models. Then we propose a proxy signature scheme from bilinear maps. The proposed proxy signature scheme is based on a secure signature […]
Layered Approach Using Conditional Random Fields for Intrusion Detection
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high […]
IRM: Integrated File Replication and Consistency Maintenance in P2P Systems
In peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques for high system performance. Despite significant interdependencies between them, these two issues are typically addressed separately. Most file replication methods rigidly specify replica nodes, leading to low replica utilization, unnecessary replicas and hence extra consistency maintenance overhead. Most consistency maintenance methods […]
Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks
In wireless sensor networks, compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation. However, this paper presents a data aggregation and authentication protocol, called […]
Image Copy-Move Forgery Detection Based on SURF
As the advent and growing popularity of image editing software, digital images can be manipulated easily without leaving obvious visual clues. If the tampered images are abused, it may lead to potential social, legal or private consequences. To this end, it’s very necessary and also challenging to find effective methods to detect digital image forgeries. […]
Visual-Semantic Modeling in Content-Based Geospatial Information Retrieval Using Associative Mining Techniques
Automatic learning of geospatial intelligence is challenging due to the complexity of articulating knowledge from visual patterns and to the ever-increasing quantities of image data generated on a daily basis. In this setting, human inspection and annotation is subjective and, more importantly, impractical. In this letter, we propose a knowledge-discovery algorithm that uses content-based methods […]
Human Facial Expression Detection from detected in captured image using back propagation neural network
In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when he/she is driving and alerting him/her when in sleepy mood will be quite useful. Human gestures can be identified by observing the different movements of eyes, mouth, […]
Drizzle: Cooperative Symbol-Level Network Coding in Multichannel Wireless Networks
Errors are inherently present in unreliable wireless channels. The primary challenge in designing error-control protocols in the medium-access control (MAC) or physical layer is to effectively maximize achievable throughput in wireless networks, even when unpredictable and time-varying errors exist. Network coding has successfully been applied to improve throughput in IEEE 802.11-based wireless networks with a […]
Hierarchically Distributed Peer-to-Peer Document Clustering and Cluster Summarization
In distributed data mining, adopting a flat node distribution model can affect scalability. To address the problem of modularity, flexibility and scalability, we propose a Hierarchically-distributed Peer-to-Peer (HP2PC) architecture and clustering algorithm. The architecture is based on a multi-layer overlay network of peer neighborhoods. Supernodes, which act as representatives of neighborhoods, are recursively grouped to […]
An Improvement in Apriori Algorithm Using Profit and Quantity
Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), quantity of items sold (weight) […]