Notice Board :

Call for Paper
Vol. 11 Issue 3

Submission Start Date:
March 1, 2025

Acceptence Notification Start:
March 10, 2025

Submission End:
March 15, 2025

Final MenuScript Due:
March 25, 2025

Publication Date:
March 31, 2025


                         Notice Board: Call for PaperVol. 11 Issue 3      Submission Start Date: March 1, 2025      Acceptence Notification Start: March 10, 2025      Submission End: March 15, 2025      Final MenuScript Due: March 25, 2025      Publication Date: March 31, 2025




Volume II Issue IX

Author Name
Upasana Choudhary, Maya Yadav
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 9
Abstract
Identification of the current interests of the user based on the short-term navigational patterns instead of explicit user information has proved to be one of the potential sources for prediction of pages which may be of interest to the user. This would help organizations in various analyses such as web site improvement. Various techniques are employed for achieving personalized recommendation. In this research employs web usage mining techniques for determining the interest of “similar” users, technique for classifying and matching an online user based on his browsing interests. A novel approach for prediction of unvisited pages has been employed. The complete process for next page prediction, represented in the architecture broadly consists of two components: offline component and online component. The offline component involves Data Preprocessing, Pattern Discovery and Pattern Analysis. The outcome of the offline component is the derivation of aggregate usage profiles using web usag
PaperID
2016/IJRRETAS/10/2016/13613

Author Name
Vinya Joshi, Deepak Sharma
Year Of Publication
2016
Volume and Issue
Volume 2 Issue 9
Abstract
Distributed Denial of Service (DDOS) attack is such kind of attack which aims to disrupt the network by draining resource capability. Here, Attacker communicates worthless messages formally known as false packet to increase network traffic and make target node busy in useless activity. The complete work observes that, DDOS attack does not require any study about network vulnerability. The major challenge with mobile network is energy issue. Its life is directly proportional with battery capacity. Thus draining in battery energy directly degrades the life of node. This project observed it as severe problem and proposed a solution to overcome the problem of power draining due to DDOS attack. Subsequently, Power draining is the major thread; where attacker not only exhausts the network traffic but also degrades the life of node as well network. This paper aims to make survey to explore solution to overcome flooding attack in WSN.
PaperID
2016/IJRRETAS/10/2016/13614