oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

匹配条件: “Prabhdeep Kaur” ,找到相关结果约1588条。
列表显示的所有文章,均可免费获取
第1页/共1588条
每页显示
Mingle Intrusion Detection System Using Fuzzy Logic
Prabhdeep Kaur,Sheveta Vashisht
International Journal of Engineering and Advanced Technology , 2013,
Abstract: Intrusion detection system must be proficient of known and unknown vulner-abilities.In order to obtain superior accuracy an appropriate dataset should be there to detect the known and unknown attacks. In this research work new approach will be proposed which will utilize fuzzy if-then rules to detect known and unknown attacks i.e. sequential multilevel misuse along fuzzy if-then rules. In order to evaluate the performance of proposed algorithm and KDD’99 data set will be used. As fuzzy if-then rules comes up with overheads so overhead will be evaluated in this research work.
A SYSTEMIC REVIEW: MICROWAVE SYNTHESIS AS A PART OF GREEN CHEMISTRY FOR THE SYNTHESIS OF NOVEL 1, 2, 4- TRIAZOLE DERIVATIVES
Anshul Chawla,Prabhdeep Kaur
International Research Journal of Pharmacy , 2013,
Abstract: Microwave reactions are based on the basic principles of green chemistry, basically involve “Go Green” concept. Purpose of green synthesis is to proceed with all the synthetic procedures which are ecofriendly and economic. Great deal of better yield in lesser time than conventional methods are observed. In medicinal chemistry, 1,2,4- triazoles are the source for potent medicaments for different pharmacological activities. In connection with this, literature is being compiled up for the sake of synthesis of 1,2,4- triazoles derivatives by using microwave irradiations.
Energy-Efficient Cluster Based Routing Techniques: A Review
Prabhdeep Singh1 , Max Bhatia2 , Ravneet Kaur3
International Journal of Engineering Trends and Technology , 2013,
Abstract: Wireless sensor networks consists of small low cost sensor nodes, having a limited transmission range and their processing, storage capabilities and energy resources are limited. These networks collect the information from nodes and transmit to base station for further processing. To perform routing in wireless sensor network with this limitation of low power, energy and storage capabilities is a major problem. Routing protocols are used for discovering and maintaining the routing in sensor networks. The most important consideration in designing protocols for WSN is the energy constraint of nodes due to limited power. Cluster based routing is capable to efficiently maintain the energy usage of sensor nodes by involving them in multi-hop communication within a particular cluster.This paper reviews some energy efficient clustering based protocols such as LEACH, PEGASIS, HEEP, TEEN in wireless sensor networks.
Concepts, Tools And Techniques Of Problem Solving Through Triz: A Review
PRABHDEEP SINGH BAJWA, DALGOBIND MAHTO
International Journal of Innovative Research in Science, Engineering and Technology , 2013,
Abstract: With the latest advances in technology along with the human advancements, a tough competition exists between various organizations and the top management. At this stage, the Research and Development (R & D) and Marketing of products are more important. As a result, the multinational enterprises should rely on both the innovations and marketing strategies of products for higher competency. TRIZ is a premier disruptive technology for innovation that can be used throughout many industries and sciences. Elements of TRIZ can be effectively used by a wide range of people -- from children to adults. The genesis of TRIZ is derived from empirical data, patents. This paper introduces the concept of ideality and an overview over the literature of TRIZ aiming to benefit the production industries in India.
Design and Develop a Honeypot for Small Scale Organization
Sakshi Sharma,,Gurleen Singh,,Prabhdeep Singh
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: Computer Network and Internet is growing every day. Computer networks allow communicating faster than any other facilities. These networks allow the user to access local and remote databases. It is impossible to protect every system on the network. In industries, the network and its security are important issues, as a breach in the system can cause major problems. Intrusion detection system (IDS) is used for monitoring the processes on a system or a network for examining the threats and alerts the administrator about attack. And IDS provide a solution only for the large scale industries, but there is no solution for the small scale industries so model is proposed for honeypot to solve the problem of small scale industries which is the hybrid structure of Snort, Nmap, Xprobe2, P0f. This model captures the activities of attackers and maintains a log for all these activities. Virtualization is performed with the help of virtual machine. The focus of this paper is primarily on preventing the attacks from external and internal attackers and maintaining the log file using honeypot with virtual machine.
Security Enhancing of a LAN Network Using Hardening Technique
Sakshi Sharma,,Gurleen Singh,,Prabhdeep Singh
International Journal of Innovative Technology and Exploring Engineering , 2013,
Abstract: Computer Networks allows access to information and services in an organized as well as controlled manner. Security is needed to make your data immune to any kind of data breach or malicious virus attacks. Hardening is to make system hard to protect from unauthorized access and is an on-going process of providing security. As, LAN hardening is done to secure whole organization network from attacks. In this paper, model is proposed for LAN hardening to reduce security risk. LAN hardening is divided into three parts- client/server, hardware and topology hardening. By applying hardening techniques on all parts LAN is harden. In client hardening table is proposed to determine security steps of operating systems and server. In server hardening, concept of masking is introduced to protect user system and to create illusion for intruders. Hardware hardening is proposed using a Table to make whole network harder .hardening of topology can be done by choosing a best one. In this way hardening of LAN is performed.
A Meliorated Defense Mechanism for Flooding Based Attacks
Gayatri Bhatti,Upma Goyal,Mr. Prabhdeep Singh
International Journal of Soft Computing & Engineering , 2013,
Abstract: The Distributed Denial of service (DDoS) attacks,over a past few years are found to be a disaster to the Internet. Aflooding-based attack attacks the victim machine by sending anexcessive amount of illegitimate traffic to it. The defencemechanisms existing before are unable to prevent the systemsfrom these attacks, since it is very difficult to trace the spoofedpackets and distinguished between the legitimate and illegitimateattack traffic. Flooding-based DDoS attacks use agents to send thetraffic and sometimes prefer Reflectors in order to forward thetraffic to the target, thereby making it impossible to be detected.So, this paper will propose a defence mechanism pronounced asHop-based DDoS defence procedure. This mechanism willcomprise of three components: detection of illegitimate packets, IPtraceback of the illegitimate packets and the traffic control. Thisframework shows high performance in defending against theflooding-based attacks.
Advances in Intrusion Detection System for WLAN  [PDF]
Ravneet Kaur
Advances in Internet of Things (AIT) , 2011, DOI: 10.4236/ait.2011.13007
Abstract: A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.
Role of Cross Layer Based Intrusion Detection System for Wireless Domain  [PDF]
Ravneet Kaur
Int'l J. of Communications, Network and System Sciences (IJCNS) , 2012, DOI: 10.4236/ijcns.2012.52010
Abstract: Wireless mesh networks are very common both for organizations and individuals. Many laptops, computers have wireless cards pre-installed for buyer. However a wireless networking has many security issues. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. They detect attempts and active misuse either by legitimate users of the information systems or by external. The present paper deals with cross layer based intrusion detection system for wireless domain—a critical anlaysis. The present paper deals with role of cross layer based intrusion detection system for wireless domain.
Stem Reserve Mobilization and Sink Activity in Wheat under Drought Conditions  [PDF]
Anil K. Gupta, Kamaljit Kaur, Narinder Kaur
American Journal of Plant Sciences (AJPS) , 2011, DOI: 10.4236/ajps.2011.21010
Abstract: The effect of water deficit on stem reserve mobilization and sink activity in wheat (Triticum aestivum L.) cultivars, viz., C306 (drought tolerant) and PBW343 (drought sensitive) was studied. Drought was maintained in pot raised plants by withholding irrigation at 95 days after sowing (DAS), i.e. just five days before the initiation of anthesis. Drought induced a significant reduction in mean biomass of all the internodes of sensitive cultivar as compared to those of tolerant one. Mobilized dry matter and mobilization efficiency were observed to be higher in the internodes of tolerant cultivar, both under control and stress conditions, which resulted in enhanced translocation of stem reserves to the grains. Water soluble carbohydrates (WSC), which mainly occur as fructans, were observed to be higher in the internodes of tolerant cultivar than those of sensitive one. When drought was applied, fructans were mobilized more effectively from the internodes of tolerant cultivar. A significantly higher sucrose synthase activity in the grains of tolerant cultivar, under drought conditions, increased the sink strength by unloading the assimilates in the sink, thereby increasing further mobilization of assimilates to the grains. Grains of sensitive cultivar attained maturity much earlier as compared to the tolerant one, both under control and stress conditions. The longer duration of grain maturation in tolerant cultivar supported enhanced mobilization of stem reserves, thus restricting heavy decrease in grain yield, under stress conditions, as compared to the sensitive cultivar. It may, therefore, be concluded that certain characteristics viz., enhanced capability of fructan storage, higher mobilization efficiency, stronger sink activity and longer duration of grain maturation might help the drought tolerant cultivar in coping the stress conditions
第1页/共1588条
每页显示


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.