Thiagarajar College of Engineering

Displaying 1-13 of 13 results

  • White Papers // Jul 2011

    Ensemble of Blowfish With Chaos Based S Box Design for Text and Image Encryption

    The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for...

    Provided By Thiagarajar College of Engineering

  • White Papers // Apr 2011

    Content Based Leaf Image Retrieval (CBLIR) Intended for e-Commerce

    This paper proposes an efficient computer-aided Plant Image Retrieval method based on plant leaf images using Shape and Texture features intended for e-commerce particularly in medical industry, botanical gardening, house plant identification etc. Log-Gabor wavelet is applied to the input image for texture feature extraction. Scale Invariant Feature Transform (SIFT)...

    Provided By Thiagarajar College of Engineering

  • White Papers // Feb 2011

    Probability Based Adaptive Invoked Clustering Algorithm in MANETs

    A Mobile Ad hoc NETwork (MANET), is a self-configuring network of mobile devices connected by wireless links. In order to achieve stable clusters, the cluster-heads maintaining the cluster should be stable with minimum overhead of cluster re-elections. In this paper the authors propose a Probability Based Adaptive Invoked Weighted Clustering...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jan 2011

    Genetic Algorithm Based Wavelength Division Multiplexing Networks Planning

    This paper presents a new heuristic algorithm useful for long-term planning of survivable WDM networks. A multi-period model is formulated that combines network topology design and capacity expansion. The ability to determine network expansion schedules of this type becomes increasingly important to the telecommunications industry and to its customers. The...

    Provided By Thiagarajar College of Engineering

  • White Papers // Sep 2010

    Transmission Range Based Clustering Algorithm for Topology Control MANET

    This paper presents a novel algorithm for clustering of nodes by Transmission Range Based Clustering (TRBC).This algorithm does topology management by the usage of coverage area of each node and power management based on mean transmission power within the context of wireless ad-hoc networks. By reducing the transmission range of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Aug 2010

    Mining of Users' Access Behavior for Frequent Sequential Pattern From Web Logs

    Sequential Pattern mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. The task of discovering frequent sequences is challenging, because the algorithm needs to process a combinatorially explosive number of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2010

    Optimized Image Steganalysis Through Feature Selection Using MBEGA

    Feature based steganalysis, an emerging branch in information forensics, aims at identifying the presence of a covert communication by employing the statistical features of the cover and stego image as clues/evidences. Due to the large volumes of security audit data as well as complex and dynamic properties of steganogram behaviours,...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jan 2010

    Real Time Classification and Clustering of IDS Alerts Using Machine Learning Algorithms

    Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the alerts generated are either false positive, i.e. benign traffic that has been classified as intrusions, or...

    Provided By Thiagarajar College of Engineering

  • White Papers // Aug 2009

    Ensemble Design for Intrusion Detection Systems

    Intrusion Detection problem is one of the most promising research issues of Information Security. The problem provides excellent opportunities in terms of providing host and network security. Intrusion detection is divided into two categories with respect to the type of detection. Misuse detection and Anomaly detection. Intrusion detection is done...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2009

    Cost and Coverage Metrics for Measuring the Effectiveness of Test Case Prioritization Techniques

    Regression testing is an important and also a very expensive activity in the software life cycle. To reduce the cost of regression testing, test cases are prioritized. One goal of test case prioritization technique is to increase a test suite's rate of fault detection and to reduce the cost of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2009

    Software Quality Achieved Through Coverage Metrics in Database Testing

    Code coverage is often defined as a measure of the degree to which the source code of a program has been tested. Various metrics for measuring code coverage exist. The number of defects is an important measure of software quality which is widely used in industry. Software test coverage tools...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jun 2009

    New Remote Mutual Authentication Scheme Using Smart Cards

    Remote mutual authentication based on smart cards is the best practical solution for remote accessing. Most of the schemes are password based. This paper proposes a new remote mutual authentication scheme using smart cards without maintaining the password table. This is based on ElGamal's. It provides high security and mutual...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jun 2009

    An Energy Efficient Cluster Formation Protocol With Low Latency in Wireless Sensor Networks

    Data gathering is an essential operation in wireless sensor network applications. So it requires energy efficiency techniques to increase the lifetime of the network. Similarly, clustering is also an effective technique to improve the energy efficiency and network lifetime of wireless sensor networks. In this paper, an energy efficient cluster...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jun 2009

    New Remote Mutual Authentication Scheme Using Smart Cards

    Remote mutual authentication based on smart cards is the best practical solution for remote accessing. Most of the schemes are password based. This paper proposes a new remote mutual authentication scheme using smart cards without maintaining the password table. This is based on ElGamal's. It provides high security and mutual...

    Provided By Thiagarajar College of Engineering

  • White Papers // Feb 2011

    Probability Based Adaptive Invoked Clustering Algorithm in MANETs

    A Mobile Ad hoc NETwork (MANET), is a self-configuring network of mobile devices connected by wireless links. In order to achieve stable clusters, the cluster-heads maintaining the cluster should be stable with minimum overhead of cluster re-elections. In this paper the authors propose a Probability Based Adaptive Invoked Weighted Clustering...

    Provided By Thiagarajar College of Engineering

  • White Papers // Aug 2009

    Ensemble Design for Intrusion Detection Systems

    Intrusion Detection problem is one of the most promising research issues of Information Security. The problem provides excellent opportunities in terms of providing host and network security. Intrusion detection is divided into two categories with respect to the type of detection. Misuse detection and Anomaly detection. Intrusion detection is done...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2010

    Optimized Image Steganalysis Through Feature Selection Using MBEGA

    Feature based steganalysis, an emerging branch in information forensics, aims at identifying the presence of a covert communication by employing the statistical features of the cover and stego image as clues/evidences. Due to the large volumes of security audit data as well as complex and dynamic properties of steganogram behaviours,...

    Provided By Thiagarajar College of Engineering

  • White Papers // Sep 2010

    Transmission Range Based Clustering Algorithm for Topology Control MANET

    This paper presents a novel algorithm for clustering of nodes by Transmission Range Based Clustering (TRBC).This algorithm does topology management by the usage of coverage area of each node and power management based on mean transmission power within the context of wireless ad-hoc networks. By reducing the transmission range of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jan 2010

    Real Time Classification and Clustering of IDS Alerts Using Machine Learning Algorithms

    Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the alerts generated are either false positive, i.e. benign traffic that has been classified as intrusions, or...

    Provided By Thiagarajar College of Engineering

  • White Papers // Aug 2010

    Mining of Users' Access Behavior for Frequent Sequential Pattern From Web Logs

    Sequential Pattern mining is the process of applying data mining techniques to a sequential database for the purposes of discovering the correlation relationships that exist among an ordered list of events. The task of discovering frequent sequences is challenging, because the algorithm needs to process a combinatorially explosive number of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jun 2009

    An Energy Efficient Cluster Formation Protocol With Low Latency in Wireless Sensor Networks

    Data gathering is an essential operation in wireless sensor network applications. So it requires energy efficiency techniques to increase the lifetime of the network. Similarly, clustering is also an effective technique to improve the energy efficiency and network lifetime of wireless sensor networks. In this paper, an energy efficient cluster...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jan 2011

    Genetic Algorithm Based Wavelength Division Multiplexing Networks Planning

    This paper presents a new heuristic algorithm useful for long-term planning of survivable WDM networks. A multi-period model is formulated that combines network topology design and capacity expansion. The ability to determine network expansion schedules of this type becomes increasingly important to the telecommunications industry and to its customers. The...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2011

    Ensemble of Blowfish With Chaos Based S Box Design for Text and Image Encryption

    The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2009

    Software Quality Achieved Through Coverage Metrics in Database Testing

    Code coverage is often defined as a measure of the degree to which the source code of a program has been tested. Various metrics for measuring code coverage exist. The number of defects is an important measure of software quality which is widely used in industry. Software test coverage tools...

    Provided By Thiagarajar College of Engineering

  • White Papers // Jul 2009

    Cost and Coverage Metrics for Measuring the Effectiveness of Test Case Prioritization Techniques

    Regression testing is an important and also a very expensive activity in the software life cycle. To reduce the cost of regression testing, test cases are prioritized. One goal of test case prioritization technique is to increase a test suite's rate of fault detection and to reduce the cost of...

    Provided By Thiagarajar College of Engineering

  • White Papers // Apr 2011

    Content Based Leaf Image Retrieval (CBLIR) Intended for e-Commerce

    This paper proposes an efficient computer-aided Plant Image Retrieval method based on plant leaf images using Shape and Texture features intended for e-commerce particularly in medical industry, botanical gardening, house plant identification etc. Log-Gabor wavelet is applied to the input image for texture feature extraction. Scale Invariant Feature Transform (SIFT)...

    Provided By Thiagarajar College of Engineering