Broadcasting is the task of sending a message from a source node to all other nodes in the network. It is frequently referred to also as data dissemination. The design of reliable and efficient broadcast protocols is a key enabler for the successful deployment of vehicular communication services. In this paper we develop the Acknowledged […]
Archives for January 2013
Secure Cloud Storage System with Secure Data Forwarding
In this paper, we address the problem of forwarding data to another user by storage servers directly under the command of the data owner. We consider the system model that consists of distributed storage servers and key servers. We propose a new threshold proxy re-encryption scheme and integrate it with a secure decentralized code to […]
Protecting Source and Sink Location Privacy in Sensor Networks
Location privacy is very important, especially in hostile environments. Failure to protect such information can completely subvert the intended purposes of sensor network applications. A number of privacy-preserving routing techniques have been developed for sensor networks. However, most of them are designed to protect against an adversary only capable of eavesdropping on a limited portion […]
Compromised machine detection using Spam Zombie System
Abstract Compromised machines are one of the key security threats on the Internet; they are often used to launch various security attacks such as spamming and spreading malware, DDoS, and identity theft. We focus on the detection of the compromised machines in a network that are used for sending spam messages, which are commonly referred […]
Identify the location of fault in Web Application using Enhanced Technique
The proposed system use existing fault localization technique likeTarantula, Ochiai, and Jaccard. These techniques predict the location of a fault by computing, for each statement, the percentages of passing and failing tests that execute that statement. The enhanced source mapping is a new technique to localize faults effectively in web applications written in PHP by […]
A Survey of XML Tree Patterns
With XML becoming a ubiquitous language for data interoperability purposes in various domains, efficiently querying XML data is a critical issue. This has lead to the design of algebraic frameworks based on tree-shaped patterns akin to the tree-structured data model of XML. Tree patterns are graphic representations of queries over data trees. They are actually […]
Detecting and Tracking Vehicle in Aerial Surveillance
In this paper we present automatic vehicle detection and tracking system for aerial surveillance. In the existing frameworks they apply either region based or sliding window based of vehicle detection in aerial surveillance. These method have highly depends on the color segmentation, a lot of miss detections on rotated vehicles and high computational complexity. So […]
MCE – Mobile Commerce Explorer for mining and prediction of mobile users
Abstract In this paper, we develop pattern mining and prediction techniques that explore the correlation between the moving behavior and purchasing transactions of mobile users to explore potential M-Commerce features. The MCE framework consists of three major components: The first component is Similarity Inference Model (SIM) for measuring the similarities among stores and items. […]
Source and Sink Location Hiding for Privacy Preservation
While many protocols for sensor network security provide confidentiality for the content of messages, contextual information usually remains exposed. Such contextual information can be exploited by an adversary to derive sensitive information such as the locations of monitored objects and data sinks in the field. Attacks on these components can significantly undermine any network application. […]
CORMAN: A Novel Cooperative Opportunistic Routing Scheme in Mobile Ad Hoc Networks
The link quality variation of wireless channels has been a challenging issue in data communications until recent explicit exploration in utilizing this characteristic. The same broadcast transmission may be perceived significantly differently, and usually independently, by receivers at different geographic locations. Furthermore, even the same stationary receiver may experience drastic link quality fluctuation over time. […]