Search
Now showing items 1-9 of 9
A comparative analysis and awareness survey of phishing detection tools
(Institute of Electrical and Electronics Engineers Inc., 2018)
Phishing is a kind of attack in which phishers use spoofed emails and malicious websites to steal personal information of people. Nowadays various tools are freely available to detect phishing and other web-based scams, ...
Analysis of VANET geographic routing protocols on real city map
(Institute of Electrical and Electronics Engineers Inc., 2018)
Vehicular Ad hoc network (VANET) is an escalating field of research and laid basis for many newer technologies like Intelligent Transport Systems (ITS). Routing in VANETs plays crucial role in performance of networks. VANET ...
Analysis of MAODV MANET routing protocol on different mobility models
(Institute of Electrical and Electronics Engineers Inc., 2018)
MANET is an infrastructure less network. It has various applications in fields like military, commercial sector, local level, etc. MANET is easy to setup, configure and build. Due to infrastructure less network, MANET ...
Detection of malicious URLs in big data using RIPPER algorithm
(Institute of Electrical and Electronics Engineers Inc., 2018)
'Big Data' is the term that describes a large amount of datasets. Datasets like web logs, call records, medical records, military surveillance, photography archives, etc. are often so large and complex, and as the data is ...
Detection of phishing websites using C4.5 data mining algorithm
(Institute of Electrical and Electronics Engineers Inc., 2018)
Phishing sites are fake sites that are made by deceptive persons which are copy of genuine sites. These websites look like an official website of any company such as bank, institute, etc. The main aim of phishing is that ...
Reversible data hiding in absolute moment block truncation coding compressed images using adaptive multilevel histogram shifting technique
(Inderscience Enterprises Ltd., 2018)
Due to advancement in communication technology, data are transmitted over the network which is either confidential or private. So, the information security is one of the most critical factors considered when secret data ...
Detection of defective printed circuit boards using image processing
(Inderscience Publishers, 2018)
Manufacturing of printed circuit boards involves three stages (printing, component fabrication over surface of printed circuit boards, soldering of components), where inspection at every stage is very important to improve ...
Video quality evaluation using DWT-SPIHT based watermarking technique
(Institute of Electrical and Electronics Engineers Inc., 2018)
The video quality analysis is very important in today's video broadcasting and transmission quality control because the quality is a key factor in customer satisfaction. This paper presents a full reference based video ...
Improved Image Fusion of Colored and Grayscale Medical Images Based on Intuitionistic Fuzzy Sets
(Taylor and Francis Ltd., 2018)
Image fusion is the process of combining the properties of two images into one single image that will show the features of both the images. There are various methods available in the literature to fuse the images. In this ...