Proxy Signature Scheme Secure against Chosen Key and Chosen Warrant Attacks

An enhanced security model for proxy signature schemes is formalized. In the new model, we consider chosen key and chosen warrant attacks which exist in real environment but were neglected in previous security models. Then we propose a proxy signature scheme from bilinear maps. The proposed proxy signature scheme is …

Continue reading

Layered Approach Using Conditional Random Fields for Intrusion Detection

Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered …

Continue reading

IRM: Integrated File Replication and Consistency Maintenance in P2P Systems

In peer-to-peer file sharing systems, file replication and consistency maintenance are widely used techniques for high system performance. Despite significant interdependencies between them, these two issues are typically addressed separately. Most file replication methods rigidly specify replica nodes, leading to low replica utilization, unnecessary replicas and hence extra consistency maintenance …

Continue reading

Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks

In wireless sensor networks, compromised sensor nodes can inject false data during both data aggregation and data forwarding. The existing false data detection techniques consider false data injections during data forwarding only and do not allow any change on the data by data aggregation. However, this paper presents a data …

Continue reading

Image Copy-Move Forgery Detection Based on SURF

As the advent and growing popularity of image editing software, digital images can be manipulated easily without leaving obvious visual clues. If the tampered images are abused, it may lead to potential social, legal or private consequences. To this end, it’s very necessary and also challenging to find effective methods …

Continue reading

Visual-Semantic Modeling in Content-Based Geospatial Information Retrieval Using Associative Mining Techniques

Automatic learning of geospatial intelligence is challenging due to the complexity of articulating knowledge from visual patterns and to the ever-increasing quantities of image data generated on a daily basis. In this setting, human inspection and annotation is subjective and, more importantly, impractical. In this letter, we propose a knowledge-discovery …

Continue reading

Human Facial Expression Detection from detected in captured image using back propagation neural network

In the field of image processing it is very interesting to recognize the human gesture for general life applications. For example, observing the gesture of a driver when he/she is driving and alerting him/her when in sleepy mood will be quite useful. Human gestures can be identified by observing the …

Continue reading

Drizzle: Cooperative Symbol-Level Network Coding in Multichannel Wireless Networks

Errors are inherently present in unreliable wireless channels. The primary challenge in designing error-control protocols in the medium-access control (MAC) or physical layer is to effectively maximize achievable throughput in wireless networks, even when unpredictable and time-varying errors exist. Network coding has successfully been applied to improve throughput in IEEE …

Continue reading

Hierarchically Distributed Peer-to-Peer Document Clustering and Cluster Summarization

In distributed data mining, adopting a flat node distribution model can affect scalability. To address the problem of modularity, flexibility and scalability, we propose a Hierarchically-distributed Peer-to-Peer (HP2PC) architecture and clustering algorithm. The architecture is based on a multi-layer overlay network of peer neighborhoods. Supernodes, which act as representatives of …

Continue reading

An Improvement in Apriori Algorithm Using Profit and Quantity

Association rule mining has been an area of active research in the field of knowledge discovery and numerous algorithms have been developed to this end. Of late, data mining researchers have improved upon the quality of association rule mining for business development by incorporating the influential factors like value (utility), …

Continue reading

Adaptive Routing in Dynamic Ad Hoc Networks

Dynamic ad hoc networks are mobile ad hoc networks (MANETs) where network characteristics, such as network density and node mobility, change significantly over time and space. Sometimes, dynamic ad hoc networks resemble a dense ad hoc network. At other times, they resemble a delay tolerant network. Many real networks follow …

Continue reading

A blind CFO estimator based on smoothing power spectrum for OFDM systems

Carrier frequency offset (CFO) estimation is a critical problem in orthogonal frequency-division multiplexing (OFDM) systems. This letter proposes a blind CFO estimator based on smoothing the signal power spectrum. A closed-form CFO estimate is also presented, which greatly reduces the computational complexity of the proposed method. Analysis and simulation results …

Continue reading