Article

Terrorist intrusion monitoring system using outlier analysis based search knight algorithm

Authors:
To read the full-text of this research, you can request a copy directly from the authors.

Abstract

Wireless Body Area Networks (WBANs) are a growing field of research; the challenges and applications have been explored and resolved by many researchers. The benefits of mobile communication based WBANs is using cellular communication as communication methodologies in the WBANs. Especially in emergency systems like medicare and military system, WBANs can be described as ease of provision, maintenance and management. In this paper, a Search Knight (SK) algorithm is proposed which is Outlier Analysis based technique. The SK algorithm is proposed for identifying unknown nodes (terrorist) in the border line using WBANs. The geographical location of the each node position is identified and tabulated on each time unit. The difference on neighbourhood time period is calculated and the proposed SK algorithm is applied to the location and movements. To detect the terrorist intrusion in the military system, the proposed SK algorithm is proved its capability and relaibility.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the authors.

... After the initial step, the expert obtains follow up tests and procedures to get more data to support or reject the original diagnosis and will attempt to narrow it down to a more specific level. A diagnostic procedure may be performed by various health care professionals such as doctor, nurse, dentist, pediatric etc., (Koteeswaran et al., 2012). ...
... Zawoad et al. (2013) which presents an architecture for a secure cloud logging service that can be easily adapted to regular file storage. Koteeswaran et al. (2012) the central idea in their paper is the interaction between multiple modules across the cloud infrastructure in order to create a secure environment for processing and storing data. Shweta and Chander (2013) here author presents an approach to enhance the invisible watermarking technique with cryptography (Sumeet, 2013). ...
Article
Full-text available
To achieve data storage security in cloud, bio cryptography techniques can be used. This study presents Personal identification using fingerprint and Iris biometric technology. Usually unimodal biometric techniques are used. Cloud computing provides many resources, very convenient charged service and minimum cost computing. This leads the cloud computing to become the most dominant computing in the recent years. Even though the cloud provide secured service, it also undergoes with some security problem especially form hackers. The existing unimodal bio cryptography techniques often have limitations such as consciousness to noise, intra class consistency, data aspect and other factors. This research study presents personal identification using fingerprint, iris and cryptographic technologies. Combined biometric technology will secure the data from unauthorized users. The purpose of this study is to study the combination of fingerprint and iris and also to include the cryptographic methods to achieve the higher accuracy and more security. The result of this study can overcome some of the limitations of using single biometric technology. The combination of Finger print and Iris form the key for Blowfish algorithm to store the secured data from unauthorized users in cloud environment.
... The cloud service providers for their own benefits they will hide the data errors from the cloud user. To prevent this problem and to control the security standard we need a (TPA) Third Party Auditor (Koteeswaran et al., 2012). The Auditor will monitor both the Service Provider and client side activities. ...
Article
Full-text available
Cloud computing is a significant shift of computational paradigm where computing as a utility and storing data remotely have a great potential. Cloud server provides a low cost, flexible, location independent platform for storing client's data. It can provide user along with varieties of service, framework, applications and storage of a huge amount of data; it includes information which is important. Along with the capabilities of the cloud computing, its security is the biggest question mark. It needs associate an independent third party auditing service to see the data integrity within the cloud server. Already past integrity checking methods will solely serve for static archive data and so cannot be applied to the auditing service since the data within the cloud may be dynamically updated. To combine the security drawback, this study proposes a secured protocol. This study initially sketch a frame for an auditing protocol, then extend the protocol to support dynamic auditing and batch auditing for each multiple clouds and multiple owners. With the support of ILEDM, this study is tracking the recent upgrades of the data within the cloud. So the replay attack can be reduced. The analysis and simulation results show that this projected auditing protocols are secure and dynamic, significantly it reduce the value of the computation of the auditor.
... The result also showed that applying voting could not enhance the KNN accuracy in the heart disease diagnosis. In Jabbar et al. (2012) and Koteeswaran et al. (2012) associative rule mining is used to model a prediction system. The author proposes an efficient associative classification algorithm using genetic approach for heart disease prediction. ...
Article
Heart Disease diagnosis is done typically by doctor's knowledge and training. But even then patients are requested to take more number of medical tests for diagnosis, in which all the tests does not contribute towards effective diagnosis of heart disease. There are nearly 15 attributes which are involved in the heart disease diagnosis process. The objective of this study is to identify the key patterns and feature subsets from the heart disease data set using the Naive Bayes classifier model. The proposed system identifies feature subsets of critical data instances in data sets. It identifies and removes the redundant attribute and inter correlated attribute. The 15 is reduced to 5 attribute using our diagnosis approach by which we can naturally reduce the computational time and cost of the process. In our proposed work we also find the critical nugget. Critical Nugget is a small collection of records or instances that contain domain-specific important information. It helps to reduce the irrelevant attribute and to find the top critical nuggets. The experimental results have validated to reduce the attribute and significantly improve the accuracy of the classification task.
... Data mining has been popularly treated as a synonym of knowledge discovery in databases; a knowledge discovery process consists of Data cleaning, Data Integration, Data Selection, Data Transformation, Data Mining, Pattern Evaluation and Knowledge Presentation. A Data Mining system may accomplish one or more of the following tasks such as Classification, Clustering, Association rule and Regression (Koteeswaran and Kannan, 2012). ...
Article
Big data related to large volume, multiple ways of growing data sets and autonomous sources. Now the big data is quickly enlarged in many advanced domains, because of rapid growth in networking and data collection. The study is defining the E-Healthcare Information System, which needs to make logical and structural method of approaching the knowledge. And also effectually preparing and controlling the data generated during the diagnosis activities of medical application through sharing information among E-Healthcare Information System devices. The main objective is, A E-Healthcare Information System which is extensive, integrated knowledge system designed to control all the views of a hospital operation, such as medical data's, administrative, financial, legal information's and the corresponding service processing. At last the analysis of result will be generated using Association Mining Techniques which processed from big data of hospital information datasets. Finally mining techniques result could be evaluated in terms of accuracy, precision, recall and positive rate.
Article
Wireless Sensor Networks in real time applications are vastly increasing due to their sensing feature. In this paper we propose an efficient routing protocol for heterogeneous wireless sensor network. Two scenarios are considered: 20 advanced nodes&80 normal nodes are used in simulation. In scenario one, Nodes transmitted data directly to the base station. In scenario two, Nodes transmitted their data to base station with assigned cluster node. After assigned rounds are completed, number of alive nodes is considered for analyzing energy efficiency, throughput, stability and network life time. Currently, two efficient routing protocols like Leech, Sep are induced to the simulations and compared with the proposed RSE routing protocol. Results proved that throughput, stability, network life time, energy efficiency are increased in our proposed model.
Article
Full-text available
Problem statement: The modern world is based on using physical, biological and social systems more effectively using advanced computerized techniques. A great amount of data being generated by such systems; it leads to a paradigm shift from classical modeling and analyses based on basic principles to developing models and the corresponding analyses directly from data. The ability to extract useful hidden knowledge in these data and to act on that knowledge is becoming increasingly important in today's competitive world. Approach: The entire process of applying a computer-based methodology, including new techniques, for discovering knowledge from data is called data mining. There are two primary goals in the data mining which are prediction and classification. The larger data involved in the data mining requires clustering and outlier analysis for reducing as well as collecting only useful data set. Results: This study is focusing the review of implementation techniques, recent research on clustering and outlier analysis. Conclusion: The study aims for providing the review of clustering and outlier analysis technique and the discussion on the study will guide the researcher for improving their research direction.
Article
Full-text available
Born on military applications, wireless sensor networks(WSNs) application grew on the promise of environment sensing and data processing capability at low cost. These networks can hold hundreds or even thousands of smart sensing nodes with processing and sensing capabilities and even integrated power through a dedicated battery. This paper surveys on the application of wireless sensor networks to healthcare promotion, namely with the use of biosensor technology applied to body sensor networks. On a wireless body sensor network, a person wears biosensors to gather data, while doing their daily activities. Currently, engineers and medical staff are cooperating on findingnew ways to properly gather meaningful data on-site and achieve a convenient way to process these data for research and on-site medical decision. New challenges that such approach brings are also considered. Moreover, it is shown that wireless sensor networks provide the technology to built wireless sensing and create a convenient infrastructure for multiple data gathering in healthcare applications. Together with real successful examples, we demonstrate the great usefulness of wireless sensor networks in healthcare promotion. The paper concludes with some guidelines for future work.
Chapter
Full-text available
Congestion in computer networks is a significant problem due to the growth of networks and increased link speeds. Now it is common to see internet gateway drops 10 the incoming packets because of local buffer overflows. An optimal solution for this problem is Predicting congestion free path(s) by learning the dynamic characteristics of networks and its topology. The factors that influence the prediction of such path(s) have the characteristics viz., dynamic, non-linear, incertitude, etc., which make traditional data mining approach, like neural prediction have to process a large amount of convoluted data. In this paper, we proposed prediction model rather than mathematical model for finding congestion free path(s). We introduced a self-motivated learning in the training phase of an improved functional link feedforward neural network for predicting reliable path that offer congestion free path(s).
Conference Paper
Full-text available
This paper presents an agent-based model to compare different coordination patterns in joint fire support (JFS) scenarios. Modern war fighting approaches depend heavily on a separation of concerns (like reconnaissance, coordination and engagement) and therefore impose high requirements on the coordination of all involved parties. Following the General Reference Model for Agent-Based Modeling and Simulation (GRAMS), we present an agent-based model of this problem domain. Our simulations indicate that decentralized JFS coordination leads to smaller average times from identification of a target to final engagement, while at the same time requiring extensive resources. Central coordination is more effective in terms of engaged units and reduced resource requirements, but tends to take more time.
Article
Full-text available
In the wide spread internet, response time and pocket loss are inappropriate due to network traffic, as a result the network efficiency becomes worst and the system provides poor Quality of Service (QoS). An optimal routing protocol, especially multipath may avoid such traffic in the network. But existing routing protocols, both single path and multi path, concentrates only on finding the routes based on any one or some set of metrics, that not always suitable for dynamic, cloud natured network environment. Ant Colony Optimization (ACO) based multipath routing protocol was suggested as an alternate to this problem by many researchers. The multipath ACO also provides same set of link(s) for the source to destination, so that traffic merging again becomes a critical problem. This paper proposes an optimal solution to avoid the problem of traffic merging in the network by removing redundant link in the route. The Proposed algorithm, called 'Redundant Link Avoidance (RLA) algorithm', is an ACO based multi path routing methodology, avoiding copious link in the suggested routes of ACO multipath protocol.
Article
Emergency service like healthcare service requires integration of wired, wireless, wireless mesh, and sensor devices with internet connectivity. The major requirement of such emergency services is providing almost all services at all time with reliable communication. This paper suggests heterogeneous network architecture called always-online anywhere anytime communication network which provides highly reliable connectivity even in an emergency situation and integrating all possible network components for offering all required services. The integration of most of the network components such as the Internet, cellular, IEEE 802.11, IEEE 802.15, IEEE 802.16, sensor networks, is mandatory for emergency services. This paper suggests a heterogeneous network architecture called always-on-line anywhere anytime communication network which provides highly reliable connectivity at all times and integrating all possible network components. Data transmission in such heterogeneity networks renders ineffective communication which is also complicated due to higher percentage of pocket loss, lesser response time, and Traffic. In this paper, we proposed an ant colony optimization technique based routing protocol which offers optimal congestion free routing in both single path and multipath requirements.
Article
The Department of Defense's future vision for Network Centric Operations (NCO) will increase combat power by networking relevant entities across the battlefield. This will result in highly complex mission scenarios in which the operator's workload will be easily overloaded if the system is not designed to support the mission requirements. New technologies for these complex command and control environments are currently being developed. Evaluating the adequacy of a particular technology for specific mission requirements is critical for military decision makers. This paper will introduce a new approach to model operator and system performance.
Article
Wireless tactical network (WTN) is the most important present-day technology enabling modern network centric warfare. It inherits many features from WMNs, since the WTN is based on existing wireless mesh networks (WMNs). However, it also has distinctive characteristics, such as hierarchical structures and tight QoS (Quality-of-Service) requirements. Little research has been conducted on hierarchical protocols to support various QoS in WMN. We require new protocols specifically optimized for WTNs. Control packets are generally required to find paths and reserve resources for QoS requirements, so data throughput is not degraded due to overhead. The fundamental solution is to adopt topology aggregation, in which a low tier node aggregates and simplifies the topology information and delivers it to a high tier node. The overhead from control packet exchange can be reduced greatly due to decreased information size. Although topology aggregation is effective for low overhead, it also causes the inaccuracy of topology information; thus, incurring low QoS support capability. Therefore, we need a new topology aggregation algorithm to achieve high accuracy. In this paper, we propose a new aggregation algorithm based on star topology. Noting the hierarchical characteristics in military and hierarchical networks, star topology aggregation can be used effectively. Our algorithm uses a limited number of bypasses to increase the exactness of the star topology aggregation. It adjusts topology parameters whenever it adds a bypass. Consequently, the result is highly accurate and has low computational complexity.