Notice Board :

Call for Paper
Vol. 16 Issue 4

Submission Start Date:
April 01, 2024

Acceptence Notification Start:
April 10, 2024

Submission End:
April 25, 2024

Final MenuScript Due:
April 30, 2024

Publication Date:
April 30, 2024
                         Notice Board: Call for PaperVol. 16 Issue 4      Submission Start Date: April 01, 2024      Acceptence Notification Start: April 10, 2024      Submission End: April 25, 2024      Final MenuScript Due: April 30, 2024      Publication Date: April 30, 2024




Volume VII Issue III

Author Name
M Ehsan Safdar, Q Vu Le
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 3
Abstract
Automated debugging is changing into more and more important because the size and quality of software system will enhanced. This paper makes a case for victimization constraint-based system repair, a recently developed technique for fault recovery, as a basis for machine-controlled debugging. System repair uses given structural integrity constraints for type information structures to monitor their correctness throughout the execution of a program. If constraint defiance is detected, revamp performs mutations on the data structures, i.e., corrupt program condition, and transforms it into another condition, that satisfies the specified constraints. The primary goal of knowledge structure repair is to remodel an inaccurate state into a suitable state. Therefore, the mutations performed by repair actions offer a basis of debugging faults in code (assuming the errors square measure thanks to bugs). A key challenge to embodying this insight into a mechanical technique arises thanks to the di
PaperID
2015/EUSRM/3/2015/22036

Author Name
S B Fotopoulos, E N Johnson, Li H
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 3
Abstract
Security being the most important concern throughout information transfers; we've varied challenges to face. The requirements of the protection model vary reckoning on the kind of data to be encrypted. Considering little size of knowledge, the requirements amendment from the present security encoding techniques. One in all the most important problems to be thought of is that the computational speed of the encoding model. Although there are several difficult encoding algorithms, which give high level of security, they increase the amount of execution time for encoding. Price effectiveness of the encoding rule is also another main concern for decisive the potency of the rule. The machine time of the algorithms have a major impact on the decisive the value effectiveness. In this paper, we have a tendency to propose associate increased price effective symmetrical key rule for tiny quantity of knowledge.
PaperID
2015/EUSRM/3/2015/22207

Author Name
Ali M, Bunnag C
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 3
Abstract
The simulation of quick information secret writing middleware has synthesized. To beat the defect of encryption mechanism that the present industrial information system offer, like not clear to application layer, security administrator can't break away the DBA, the dearth of key management system. A middleware of information secret writing is designed and accomplished is applied between the higher application and the information system, and therefore the clear knowledge encryption/decryption and freelance key management system are provided.
PaperID
2015/EUSRM/3/2015/22295

Author Name
M Trivedi, P Patidar, M K Rawat
Year Of Publication
2015
Volume and Issue
Volume 7 Issue 3
Abstract
A Mobile Ad hoc Network is an effortless target of different Security attacks. It’ is a network with uncertain infrastructure, ad hoc topology and mobile nodes. This makes it at high risk of being attacked by different security threats. Denial of Service (DOS) has been a major field of research in which RREQ (route request) flooding attack is one of the most common yet serious attacks that targets the AODV protocol, disturbs the routing and eats up the network resources. This manuscript talks about RREQ DOS flooding attack and presents a Novel approach based on Fuzzy Rule Base. The result outcomes illustrated here clearly present the positive effects of the approach.
PaperID
2015/EUSRM/3/2015/22315