• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com


Engineering and Scientific International Journal

Journal Papers (7) Details Call for Paper Manuscript submission Publication Ethics Contact Authors' Guide Line
1 An Effective Implementation of HTML Injection , Bharat Bhatia, Charu Sharma
HTML injection is an attack that is closely related to Cross-site Scripting (XSS). The difference is not in the vulnerability, but in the type of attack that leverages the vulnerability. Hypertext Markup Language (HTML) injection, also sometimes referred to as virtual defacement, is an attack on a user made possible by an injection vulnerability in a web application. When an application does not properly handle user supplied data, an attacker can supply valid HTML, typically via a parameter value, and inject their own content into the page. This attack is typically used in conjunction with some form of social engineering, as the attack is exploiting a code-based vulnerability and a user's trust.
2 Cloud Virtualization: An Overview, Shweta A. Gode
Cloud computing is one of today's most exciting technology because of its cost-reducing, flexibility, and scalability. With the fast growing of cloud computing technology, Data security becomes more and more important in it. In evaluating whether to move to cloud computing, it is important to compare benefits and also risks of it. Thus, security and other existed issues in the cloud cause cloud clients need more time to think about moving to cloud environments. But Security-related topics is one of the most arguable issues in the cloud computing which caused several enterprises looks to this technology uncertainly and move toward it warily. Virtualization is a term that refers to the abstraction of computer resources. The purpose of virtual computing environment is to improve resource utilization by providing a unified integrated operating platform for users and applications based on aggregation of heterogeneous and autonomous resources. More recently, virtualization at all levels (system storage, and network) became important again as a way to improve system security, reliability and availability, reduce costs and provide greater flexibility.
3 A Novel Protocol for Packet Arrivals in DTNs, K.Surekha, M. Srujan Reddy
Delay tolerant Networks (DTNs) is an approach to network architecture which will targets the heterogeneous network. Delay tolerant network may will deals with mobile nodes even the mobile nodes dont have any end-to-end connection. From the above context, contacts between the two nodes are limited because of its low density of active network nodes. So make sure routing statics to permit the time delivery from source to destination with maximum probability. If the portability between nodes cant known before which may cost of repeat the actual information, this process may consume lots of power and storage resources. In this paper we explain about packet pair property in First-In-First-Out queuing networks and shown you how it can measure through bottleneck link bandwidth. The First-In-First-Out queuing network judges the difference in two packet landing times with equal sizes from same source to destination. We have described the protocols for optimality of proper delivery and mean delay. Here we may differentiate the two conditions, one is source may overwrite its packets in relay nodes and second is source may not.
4 Management of Secure IDS for Mobile Ad-Hoc Network, B. Reddy Sumanth, Dr. E. Madhusudhana Reddy
In the modern world, mobile ad-hoc networks are consider as very popular research area. MANET is one of the important and unique applications in this field. The mobility and scalability brings by wireless networks are common and it possible in various applications. Mobile ad-hoc network does not require a fixed network infrastructure and here every single node work as both transmitter and receiver. When the nodes are within the same communication range they communicate directly with each other. This approach is an important factor in many service oriented applications. In this type, the system overcomes so many security issues through intrusion detection methodology.
5 Analyzing Download time Performance of University Websites in India, Dr. G. Sreedhar
The download time of website depends on various web components such as multimedia size, document size, program size and so on. The main objective of this paper is to Analyze Download time of University Websites in India and evaluating the quality of Website Download time Performance based on Download time Performance metric. The Download time of websites is measured in various grades viz., A, B, C, D, E, F etc., A 10 point metric for Download time performance is investigated based on Download time performance grades.
6 Comparative analysis of different Edge detection techniques for biomedical images using MATLAB, Millee Panigrahi*1, Rina Mahakud*2, Minu Samantaray *3, Sushil Kumar Mohapatra *4
Edge detection appreciably preserves the important structural properties in an image and filters out unwanted information while reducing the amount of data. Edges outline the boundaries and are therefore a problem of fundamental importance in image processing of biomedical signals. The method used in this paper is to detect the tumor boundaries in the MRI image using various edge detection techniques. The result of this method makes very clear for physician to distinguish the tumor portion for surgical planning. It has been shown that with proper selection of the threshold value of the image the filters gives better result in terms of edge and PSNR for a given image .It has been shown that Cannys edge detection algorithm performs better than all other operators under almost all scenarios. Experimental results presented in this paper are obtained by using MATLAB.
7 SE-AODV-Secured and Energy Efficient Routing in Mobile Ad-hoc Network , S.Sridhar#1, R.Baskaran*2
Mobile ad hoc network (MANET) is a standalone network capable of autonomous operation where nodes communicate with each other without the need of any existing infrastructure. Mobile ad hoc networks consist of nodes that cooperate to provide connectivity and are free to move and organize randomly. Every node is router or an end host, in general autonomous and should be capable of routing traffic as destination nodes sometimes might be out of range. Nodes are mobile since topology is very dynamic and they have limited energy and computing resources. These nodes are often vulnerable to failure thus making mobile ad hoc networks open to threats and attacks. Communication in MANET relies on mutual trust between the participating nodes but the features of MANET make this hard. Nodes sometimes fail to transmit and start dropping packets during the transmission. Such nodes are responsible for untrustworthy routing. Nodes should also be considered for sufficient energy levels to make transmission. A secured scheme can be used to track these untrustworthy nodes and isolate them from routing, thus provide trustworthiness. In this paper a secured and energy based AODV (SE-AODV) protocol is presented which implements a message digest algorithm for every transmission. Energy is introduced and nodes are considered for routing only if they have energy level higher than the threshold (Average energy value of nodes considered for routing). The SE-AODV increases PDR and decreases delay thereby enhancing the QoS metrics and trustworthiness in AODV based MANET routing. The work is implemented and simulated on NS-2. The simulation result shows the proposed SE-AODV provides more trustworthy routing compared with general AODV.