Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 3
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

Cyber-attacks are increasing day by day. The generation of data by the population of the world is immensely escalated. The advancements in technology, are intern leading to more chances of vulnerabilities to individual’s personal data. Across the world it became a very big challenge to bring down the threats to data security. These threats are not only targeting the user data and also destroying the whole network infrastructure in the local or global level, the attacks could be hardware or software. Central objective of this paper is to design an intrusion detection system using ensemble learning specifically Decision Trees with distinctive feature selection univariate ANOVA-F test. Decision Trees has been the most popular among ensemble learning methods and it also outperforms among the other classification algorithm in various aspects. With the essence of different feature selection techniques, the performance found to be increased more, and the detection outcome will be less prone to false classification. Analysis of Variance (ANOVA) with F-statistics computations could be a reasonable criterion to choose distinctives features in the given network traffic data. The mentioned technique is applied and tested on NSL KDD network dataset. Various performance measures like accuracy, precision, F-score and Cross Validation curve have drawn to justify the ability of the method.
Go to article

Bibliography

[1] Ektefa, M. Mohammadreza, S. Sara and A. Fatimah, “Intrusion detection using data mining techniques,” 200 - 203. DOI: 10.1109/INFRKM.2010.5466919.
[2] Y. Wang, W. Cai and P. Wei, “A Deep Learning Approach For Detecting Malicious Javascript Code,” Wiley Online Library . February 2016.
[3] C. Yin , Y. Zhu, J. Fei and H. Xinzheng, “A Deep Learning Approach For Intrusion Detection Using Recurrent Neural Networks,” IEEE Access. November 7, 2017.
[4] Q. Niyaz, W. Sun, Y Javaid and A. Mansoor, “A Deep Learning Approach For Network Intrusion Detection system,” In Eai Endorsed Transactions on Security and Safety, Vol. 16, Issue 9, 2016.
[5] M. Preeti, V. Vijay, T. Uday and S. P. Emmanuel, “A Detailed Investigation And Analysis Of Using Machine Learning Techniques For Intrusion Detection,” IEEE Communications Surveys & Tutorials, Volume: 21, Issue:1, First quarter 2019.
[6] Y. Li, M. Rong And R. Jiao, “A Hybrid Malicious Code Detection Method Based On Deep Learning,” International Journal of Software Engineering and Its Applications 9(5):205-216, May 2015.
[7] Gulshan and Krishan, “A Multi-Objective Genetic Algorithm Based Approach For Effective Intrusion Detection Using Neural Networks,” Springer. 2015.
[8] K. Levent and D. C. Alan, “Network Intrusion Detection Using A Hidden Naïve Bayes Binary Classifier,” 2015 17th Uksim-Amss International Conference on Modelling and Simulation (Uksim).
[9] A. Nadjaran, K. Mohsen, “A New Approach To Intrusion Detection Based On An Evolutionary Soft Computing Model Using Neuro-Fuzzy Classifiers,” July 2007, Computer Communications 30(10):2201-2212.
[10] D. Amin and R Mahmood, “Feature Selection Based On Genetic Algorithm And Support Vector Machine For Intrusion Detection System,” The Second International Conference On Informatics Engineering & Information Science (Icieis2013).
[11] A. Preeti and S. Sudhir, “Analysis of KDD Dataset Attributes - Class wise for Intrusion Detection,” Procedia Computer Science, Volume 57, 2015, 842-851,
[12] D. M. Doan, D. H. Jeong and S. Ji, “Designing a Feature Selection Technique for Analyzing Mixed Data,” 2020 10th Annual Computing and Communication Workshop and Conference (CCWC), Las Vegas, NV, USA, 2020, pp. 0046-0052, doi: 10.1109/CCWC47524.2020.9031193.
[13] Campbell and Zachary, “Differentially Private ANOVA Testing,” 2018 1st International Conference on Data Intelligence and Security (ICDIS) (2018): 281-285.
[14] S. K. Murthy, “Automatic Construction of Decision Trees from Data: A Multi-Disciplinary Survey. Data Mining and Knowledge Discovery 2, 345–389 (1998).
[15] S. Dhaliwal, A. Nahid and R. Abbas, “Effective Intrusion Detection System Using XGBoost. Information 2018, 9, 149.
[16] Pedregosa et al., “Scikit-learn: Machine Learning in Python,” JMLR 12, pp. 2825-2830, 2011.

Go to article

Authors and Affiliations

Shaikh Shakeela
1
N. Sai Shankar
1
P Mohan Reddy
1
T. Kavya Tulasi
1
M. Mahesh Koneru
1

  1. ECM, Koneru Lakshmaiah Education Foundation, Vaddeswaram, AP, India
Download PDF Download RIS Download Bibtex

Abstract

The parenchyma cellulose isolated from bagasse pith was used as an alternative resource for preparation of water-soluble cellouronic acid sodium salt (CAS). The influence of ultrasound treatment on the cellulose was investigated for obtaining CAS by regioselective oxidization using 4-acetamide-TEMPO and NaClO with NaClO2 as a primary oxidant in an aqueous buffer at pH 6.0. The yield, carboxylate content and polymerization degree (DP) of CAS were measured as a function of ultrasonic power, agitating time and cellulose consistency by an orthogonal test. The ultrasound-treated conditions were further improved by discussion of ultrasonic power, the most important factor influencing the yield and DP. An optimized CAS yield of 72.9% with DP value (DPv) of 212 was found when the ultrasonic strength is 550 W, agitating time is 3 h and cellulose consistency is 2.0%. The oxidation reactivity of cellulose was improved by ultrasonic irradiation, whereas no significant changes in crystallinity of cellulose were measured after ultrasonic treatment. Moreover, the ultrasound treatment has a greater effect on yielding CAS from parenchyma cellulose than from bagasse fibrous' one. The CAS was further characterized by Fourier transform infrared spectroscopy (FT-IR) and Scanning electron microscopy (SEM).

Go to article

Authors and Affiliations

Xin Gao
Keli Chen
Heng Zhang
Lincai Peng
Download PDF Download RIS Download Bibtex

Abstract

The Krónik Library preserves a seal stamp made of green jasper, with the curved coat of arms of Ogończyk under a count’s crown and a cross of the St. Stanislas Order. The golden handle was shaped as the bust of a black boy wearing a turban. This element was also encrusted with previous stones (turquoise, almandine and opal). Most likely this figural presentation of the seal was produced in Dresden. The goldsmith may have been inspired by a catalogue of jewellry designs, drawn according to the projects of Friedrich Jacob Morisson of Vienna, published in Augsburg in 1693. It is very likely that the bust was purchased in Dresden by Augustyn Działyński (1715-1759), governor of Kalisz, when the seal itself was ordered – most likely in 1786 by his son Ksawery Działyński (1756-1819). The latter was received in 1786 by the Order of Saint Stanisław and in 1786 by the rank of the count. The handle of the seal stamp can be considered as an example of European influence on Polish cultural peripheries, in particular the fashion of the esoteric, as well as on Polish nobility, which often claimed in the seventeenth and eighteenth centuries that the gentry was directly linked with the ancient Sarmatians.

Go to article

Authors and Affiliations

Zygmunt Dolczewski

This page uses 'cookies'. Learn more