Samrat Ashok Technological Institute

Displaying 1-5 of 5 results

  • White Papers // Jan 2012

    An Empirical Comparison and Feature Reduction Performance Analysis of Intrusion Detection

    This paper reports on the empirical evaluation of five machine learning algorithm such as J48, BayesNet, OneR, NB and ZeroR using ten performance criteria: accuracy, precision, recall, F-Measure, incorrectly classified instances, kappa statistic, mean absolute error, root mean squared error, relative absolute error, root relative squared error. The aim of...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Jul 2011

    An Improvement of AODV Protocol Based on Threaded Routing in Mobile Ad Hoc Networks

    The Mobile Ad hoc NETworks (MANETS) are suitable to be utilized in the context of an extreme emergency conditions such as battle field and disaster recovery because less requirement of infrastructure and dynamic nature. These, along with applications of these networks in military, government and in commercial area, MANETs are...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Feb 2011

    Honeypot Based Secure Network System

    A honeypot is a non-production system, designed to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Apr 2010

    Combinatorial Approach of Associative Classification

    Association rule mining and classification are two important techniques of data mining in knowledge discovery process. Integration of these two has produced class association rule mining or associative classification techniques, which in many cases have shown better classification accuracy than conventional classifiers. Motivated by this study the authors have explored...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Jun 2009

    New Efficient Iterative Optimization Algorithm to Design the Two Channel QMF Bank

    This paper proposes an efficient method for the design of two channel Quadrature Mirror Filter (QMF) bank. To achieve minimum value of reconstruction error near to perfect reconstruction, a linear optimization process has been proposed. Prototype low pass filter has been designed using Kaiser window function. The modified algorithm has...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Apr 2010

    Combinatorial Approach of Associative Classification

    Association rule mining and classification are two important techniques of data mining in knowledge discovery process. Integration of these two has produced class association rule mining or associative classification techniques, which in many cases have shown better classification accuracy than conventional classifiers. Motivated by this study the authors have explored...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Jun 2009

    New Efficient Iterative Optimization Algorithm to Design the Two Channel QMF Bank

    This paper proposes an efficient method for the design of two channel Quadrature Mirror Filter (QMF) bank. To achieve minimum value of reconstruction error near to perfect reconstruction, a linear optimization process has been proposed. Prototype low pass filter has been designed using Kaiser window function. The modified algorithm has...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Feb 2011

    Honeypot Based Secure Network System

    A honeypot is a non-production system, designed to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. There has been great amount of work done in the field of network intrusion detection over the past three decades. With networks getting faster and with the increasing dependence on the...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Jul 2011

    An Improvement of AODV Protocol Based on Threaded Routing in Mobile Ad Hoc Networks

    The Mobile Ad hoc NETworks (MANETS) are suitable to be utilized in the context of an extreme emergency conditions such as battle field and disaster recovery because less requirement of infrastructure and dynamic nature. These, along with applications of these networks in military, government and in commercial area, MANETs are...

    Provided By Samrat Ashok Technological Institute

  • White Papers // Jan 2012

    An Empirical Comparison and Feature Reduction Performance Analysis of Intrusion Detection

    This paper reports on the empirical evaluation of five machine learning algorithm such as J48, BayesNet, OneR, NB and ZeroR using ten performance criteria: accuracy, precision, recall, F-Measure, incorrectly classified instances, kappa statistic, mean absolute error, root mean squared error, relative absolute error, root relative squared error. The aim of...

    Provided By Samrat Ashok Technological Institute