i-manager's Journal on Software Engineering (JSE)


Volume 3 Issue 1 July - September 2008

Article

Approaches to the Application of the Unified Modelling Language in Manufacturing Automation

Tom Page* , Gisli Thorsteinsson**
Tom Page and Gisli Thorsteinsson (2008). Approaches to the Application of the Unified Modelling Language in Manufacturing Automation. i-manager’s Journal on Software Engineering, 3(1),1-5. https://doi.org/10.26634/jse.3.1.284

Abstract

It has been recognised, that there is a need to employ improved development methods when designing Manufacturing Automation Systems. This need is addressed in part by the implementation of the IEC 61131-3 Standard. Best development practices require that control systems for Programmable Logic Controllers (PLCs) and Process Automation to be developed in a manner that engenders modularity and reuse. Development methodologies such as the Object Modelling Technique (OMT) and the Booch Method have previously been investigated. This paper sets out the basis for the suitability of UML and modelling in programming in the Manufacturing Automation sector of electronics.

Research Paper

Genetic Algorithm’s Fitness value and false positive in Network Intrusion Detection System

Jeya S*
Jeya S (2008). Genetic Algorithm’s Fitness value and false positive in Network Intrusion Detection System. i-manager’s Journal on Software Engineering, 3(1),6-11. https://doi.org/10.26634/jse.3.1.292

Abstract

Network Intrusion detection systems aim is detecting attacks against computer systems and networks.  This paper focuses on the development of Genetic Algorithm in Intrusion Detection System (GAIDS). Genetic Algorithms can provide appropriate heuristic search methods. However, balancing the need to detect all possible attacks found in network with the need to avoid false positives is a challenge, given the scalar fitness values required by Genetic Algorithms. This study discusses a fitness function independent of variable parameters to overcome this problem. This fitness function allows the IDS to significantly reduce both its false positive and false negative rate.

Research Paper

Hybrid Wired/Wireless PROFIBUS Timing Analysis under Transient Faults

Saad H. Al-tak* , Sufyan T. Faraj Al-Janabi**
Saad H. Al-tak and Sufyan T. Faraj Al-Janabi. (2008). Hybrid Wired/Wireless PROFIBUS Timing Analysis under Transient Faults. i-manager’s Journal on Software Engineering, 3(1),12-22. https://doi.org/10.26634/jse.3.1.296

Abstract

Fieldbus networks, as a part of distributed control applications, are subjected to harsh environment that may cause different faulty conditions. This is more pronounced in the case of hybrid wired/wireless networks because of the high susceptibility of wireless communication to such environment. PROFIBUS as one of the widely applied fieldbus protocols is considered here. Consequently, a timing analysis for hybrid wired/wireless PROFIBUS networks under a bounded error model is proposed. In this context, two alternatives for Hybrid Wired/Wireless - Multiple Logical Rings (MLR) - are discussed on the base of a single PROFIBUS network — the Single Logical Ring (SLR) - analysis. This work is essential to assess the real-time behaviour of such a PROFIBUS network under the incidence of errors.

Research Paper

WLAN based Indoor and Outdoor Location Determination System using Mesh- LOIDS

Krishna Naik K* , M. N. Giri Prasad**
Krishna Naik K and Giri Prasad M.N (2008). WLAN based Indoor and Outdoor Location Determination System using Mesh- LOIDS. i-manager’s Journal on Software Engineering, 3(1), 23-29. https://doi.org/10.26634/jse.3.1.299

Abstract

People get connected with their friends and relatives, at the same time some new friendships and relationships may form in day-to-day life. The same principle gives the basic idea behind developing a Mesh Network. Mesh Network is a complete on-demand and meshed ad-hoc network. Mesh networking provides an innovative method to build complex data networks very easily. Mesh Networking is particularly suited to wireless networks, where the connections can't be predicted in the same way as a wired network, catering for mobile nodes, instant growth and unpredictable variations in reception and coverage. As each mesh node is autonomous, discovering routes on demand, without central control to act as a bottleneck. Routes are established on demand, and un-used routes are flushed out after a short time.  Meshing is a fundamentally different approach to routing through networks, and does not follow the conventions of network design. The node may discover many potential routes through the network, and it will select the most suitable route based upon the shortest distance to reach the other node. In this paper we are discussing the possibilities of meshing in indoor and outdoor environments and locating the mobile user with the help of self designed application and sniffers. We also simulated our work with Pamvotis WLAN simulator.

Research Paper

Bandwidth Optimization through Multi-Source Virtual Dynamic Routing Algorithm in ATM Networks

Subramani A* , Krishnan A**
Subramani A and Krishnan A (2008). Bandwidth Optimization through Multi-Source Virtual Dynamic Routing Algorithm in ATM Networks. i-manager’s Journal on Software Engineering, 3(1),30-38. https://doi.org/10.26634/jse.3.1.302

Abstract

Asynchronous Transfer Mode (ATM) is widely used in telecommunications systems to send data, video and voice at a very high speed. In ATM network optimizing the bandwidth through dynamic routing is an important consideration. Previous research work shows that traditional optimization heuristics result in suboptimal solution. In this paper we have explored non-traditional optimization technique. We propose comparison of two such algorithms - Genetic Algorithm (GA) and Multi-Source Virtual Dynamic Routing Algorithm (MSVDR), based on non-traditional Optimization approach, for solving the dynamic routing problem in ATM networks which in return will optimize the bandwidth. The optimized bandwidth could mean that some attractive business applications would become feasible such as high speed LAN interconnection, teleconferencing etc. We have also performed a comparative study of the selection mechanisms in MSVDR and listed the best selection mechanism and a new initialization technique which improves the efficiency of the MSVDR.

Research Paper

Efficient Dynamic-Id Based Password Authenticated Key Agreement Using Smart Cards Without Time Concurrency

Shoba Bindu C* , Chandra Sekhar Reddy P**, Satya Narayana B***
Shoba Bindu C, Chandra Sekhar Reddy P and Satya Narayana B (2008). Efficient Dynamic-Id Based Password Authenticated Key Agreement Using Smart Cards Without Time Concurrency.i-manager’s Journal on Software Engineering, 3(1), 39-44. https://doi.org/10.26634/jse.3.1.305

Abstract

Remote user authentication and key agreement scheme using smartcards is a very practical solution to validate the eligibility of a remote user and provide secure communication later. In this paper, we propose an efficient dynamic-id based remote user authentication and key agreement scheme using smartcards. The major merits of this scheme include, the scheme does not need any verification table, users can freely choose and change their passwords, the computation and communication costs are very low as our scheme uses one-way hash functions, block ciphers and smartcards. In addition the scheme offers mutual authentication between servers and users and it is a nonce based scheme which does not have a serious time-synchronization problem. The scheme is secure against Id-theft, can resist against replay attacks, stolen verifier attacks, guessing attacks, reflection attack and offers forward secrecy and known-key security.

Research Paper

Covert Encryption and Document Authentication using Texture Coding

Jonathan Blackledge* , Mary Lynne Hallot**
Jonathan Blackledge and Mary Lynne Hallot (2008). Covert Encryption and Document Authentication using Texture Coding. i-manager’s Journal on Software Engineering, 3(1),45-65. https://doi.org/10.26634/jse.3.1.500

Abstract

With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation.  In this paper, a new approach to digital watermarking is presented and a range of possible applications considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a ‘scramble image’ by diffusing a watermark image with a noise field (a cipher). The cover image (covertext) is then introduced using a simple additive process (confusion). The watermark is subsequently recovered by removing the covertext and then correlating the output with the original (key dependent) noise field. For covert encryption, this approach provides the user with a method of hiding ciphertext (the scrambled image) in a host image before transmission of the data. With regard to document authentication, we consider a diffusion only or ‘texture coding’ approach that is robust to a wide variety of attacks including geometric attacks, crumpling, and print/scan attacks are considered.

Research Paper

Remote User Authentication Using Cognition based Graphical Passwords

Raj* , Shoba Bindu C**, Chandra Sekhar Reddy P***, Satya Narayana B****
Raj Mohammed, Shoba Bindu C, Chandra Sekhar Reddy P and Satya Narayana B (2008). Remote User Authentication Using Cognition based Graphical Passwords.i-manager’s Journal on Software Engineering, 3(1),. 66-71. https://doi.org/10.26634/jse.3.1.501

Abstract

In general, alphanumeric passwords are used for remote user authentication. But, these are vulnerable to security and usability problems. To solve these problems, wei-chi-ku et. al. proposed “Remote user authentication scheme using strong Graphical passwords” which are not resistant to shoulder-surfing attack, a critical problem of graphical passwords. This paper presents a Dynamic ID-based remote user authentication scheme which is resistant to shoulder surfing attack and it also achieves mutual authentication. This paper also makes a comparison of usability and security aspects of the proposed scheme with wei-chi-ku et al. scheme.

Research Paper

Fuzzy logic integration in the multi-criteria support decision

Raouf Ketata* , Hajer Ben Mahmoud**, Taieb Ben Romdhane***
Raouf Ketata, Hajer Ben Mahmoud and Taieb Ben Romdhane (2008). Fuzzy logic integration in the multi-criteria support decision. i-manager’s Journal on Software Engineering, 3(1), 72-83. https://doi.org/10.26634/jse.3.1.502

Abstract

This paper presents a methodology based on the integration of the fuzzy logic to solve multi-selection problem. To this end, it took the introduction of fuzzy logic at the multi-criteria methods taking into account the limitations. This turn gave birth to a fuzzy new approach based on combination of the multi-criteria method “Fuzzy Analytical Hierarchy Process” (FAHP) and the “Goal Programming” (GP) in order to take into account at the same time the quantitative and qualitative factors and the reliability. Better yet, bearing in mind the reliability concept and fuzzy constraints, we were proposed to introduce fuzzy logic at the GP method. This gave birth to the “Fuzzy Goal Programming” (FGP). This logic has also been integrated into a System Aid Decision (SAD) based on fuzzy expert system. Indeed, the fuzzy expert system thus obtained helps the user's in making the decision without much care for the method to be used. Two numerical examples in two different sectors are presented to illustrate this new approach which includes the fuzzy expert system. The achieved results have shown the importance of the integration of fuzzy logic in the classical multi-criteria methods.