Archive Browsing VOLUME 7 ISSUE 07 FEBRUARY 2019

Fuzzy Logic based Optimized Relay Selection Protocol for Cooperative Wireless Network
Abstract: Cooperative communications can be extremely proficient in combating fading multipath channels and enhance scope with complexity and cost. Furthermore there is also possibility of improving performance of cooperative communication by optimal relay selection strategies. Relay selection is a technique that can considerably increase the performance of cooperative communications. This paper presents a fuzzy logic based relay selection protocol for cooperative wireless network. The transmit power for broadcast phase is optimized by Artificial Bee Colony (ABC) algorithm. The performance of the proposed system is evaluated on the basis of Bit Error Rate (BER).

Authors: Deepika Joshi, Smita Patil, Rupesh Dubey

File Name: Deepika_70500-18-102.pdf
 Download Abstract | Download Full Paper


Analysis and Design a Model for Cyber Forensic and Digital Investigation
Abstract: Computer forensics is important. The procedures are important to follow because doing so ensures evidence will be admitted and suspects will be more likely to face the consequences if found guilty. Following these procedures also means using the proper forensic tools to analyze data correctly. The tools used depend on what is being analyzed. Smaller companies or an individual user might not need many resources to secure their computers but perhaps a big organization might need many different types of applications to monitor hundreds of computers and dozens of sub-networks. This might require a digital evidence bag for more efficient collection of data. Also, certain technologies would benefit from a digital evidence bag such as magnetic card readers due to specific programs associated with the device to operate and process information. This paper discussed some of the forensic software tools that CFSs use during their investigations. Four of these tools were evaluated with respect to their functionalities and effectiveness within the forensic investigation methodology. Finally, a discussion about these tools is given. The purpose of our approach is to highlight the shortcomings of current tools in order to provide suggestions for improvements. It is very important that CFSs are able to stay ahead of cyber-criminals through the use of forensic tools that allow them to reliably carry out their tasks within an investigation. We believe that if the suggested improvements to these tools are further researched, prosecutions of cyber-crimes will definitely increase.

Authors: Hiteshkumar Gunvantbhai Patel, Dr. Chandikaditya Kumawat, Dr. Jigar Patel

File Name: Hitesh_70300-18-103.pdf
 Download Abstract | Download Full Paper


Analysis and Design of a Model for Cyber Security
Abstract:

Authors: Hemantkumar Narayanbhai Patel, Dr. Chandikaditya Kumawat, Dr. Jigar Patel

File Name: Hemant_70300-18-104.pdf
 Download Abstract | Download Full Paper


© 2016 IJDACR Journal. All rights reserved.