JCT - Volume 3 Issue 7 (July 2014)

 


Sr/No/ Title Pdf
1 Detection of Intrusion and Recovery for Smartphones using Cloud Services
I.B.Rajeswari, Prof. Dipti Patil

Abstract—Smart phones are popular and most used. Since smart phones use the same software architecture as in PCs, they are vulnerable to similar classes of security risks such as intrusion and hacking. This project proposes an intrusion detection and prevention for smart phone using cloud services which continuously performs an in-depth forensics analysis on the smart phone to detect any misbehaviour such as wrong passwords and intrusion. It protects the smart phone, from the data steeling and other security issues. In case misbehaviour is detected, the proposed engine decides upon and takes optimal response actions to prevent the occurrence of ongoing attacks. Despite the computational and storage resource limitations in smart phone devices, the engine can perform a complete and in-depth analysis on the smart phone and data storage, since all the investigations are carried out on an emulated device in a cloud environment. To address the critical challenge of keeping smart phone secure, cloud services has been proposed to prevent the intrusion and block the attack immediately.

Download
2 A Study on Speech Recognition Technology
Arul.V.H, Dr. Ramalatha Marimuthu

Abstract— The paper highlights a brief study on speech recognition technology, describing the various processing stages and results and also some primary applications as well. Following this review some of the vital strengths and speech processing steps will also discuss.
Download
3 Performance Metrics for DSDV, DSR, AODV in Mobile Ad-hoc Network Using Network Simulator
Basu Dev Shivahare, Anil Sajnani , Amar Deep Gupta

Abstract— A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies. Mantes are infrastructure less and can be set up anytime, anywhere.. The routing algorithms considered are classified into two categories proactive (table driven) and reactive (on demand). DSDV, DSR, and AODV algorithms are considered. We simulate various MANET routing algorithms in network simulator NS-2 and compare the performance metrics for each Routing protocol like throughput, packet delivery ratio and average end to end delay by varying the number of nodes (Node 20 and Node 30 Group)with different pause time by using cbr source traffic and node movement model
Download