IoT Assistive Technology for People with Disabilities
Soulease: A Mind-Refreshing Application for Mental Well-Being
AI-Powered Weather System with Disaster Prediction
AI Driven Animal Farming and Livestock Management System
Advances in AI for Automatic Sign Language Recognition: A Comparative Study of Machine Learning Approaches
Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Increasing demand for quality software that meets the criteria of being economical, portable, efficient, reliable, robust, and upgradable has been met with the component based approach to software development. A further constraint today is the availability of trained man-power pool. A component is used on either an “as-is” basis (adoption) or on a “parameterized” basis (adaption). New components are added to the pool when necessary. The term “template” is frequently used for components. Component Based Software Engineering (CBSE) has thus emerged as the new effective paradigm in the 90’s. Measurement techniques in CBSE have, however, been rather limited. Even the so called ‘global’ methods like Mark II Function Points are not quite suitable when it comes to CBSE. The paper reviews the research work of various authors in the area of metrics in CBSE. Many of these authors have focused on extending Object-Oriented metrics like C-K metrics. Three areas under close scrutiny are complexity, customizability, and reusability. These authors have based their approaches more on theoretical aspects, while empirical studies have been neglected. Even the Verner- Tate empirical studies are based on the Fourth Generation Language Paradigm of the 80’s (where traditional metrics can be applied with relative ease). Today we would not accept them as CBSE. The authors’ suggestion is to include architectural styles, architectural patterns, and frameworks while studying metrics. Two examples are OMG’s CORBA and Microsoft’s DCOM. A number of frameworks are available in the Open Source community. The paper presents the findings of a small study of projects undertaken by students in the web publishing area. It is the authors’ contention that metrics must be specific to the framework used for implementation. It is a relatively simple task to mount an instrument in a framework such as TYPO3 (Open Source Web Content Management System Framework) for measurement purposes. This is illustrated in our paper. It would take a number of such studies to validate various metric models proposed by authors in the area of CBSE.
This paper presents a new and efficient algorithm that provides a high degree of integrity for the packets, which are encrypted using Quadratic Residue Cryptography. This standard, evolved from the base of Quadratic Residuosity Problem, provides security for the bit in the information super highway. Even though a number of Quadratic Residue encryption techniques are available, there is no algorithm for ensuring its integrity. Quadratic Residue Integrity Standard will nullify the same.
This paper describes a technique of applying Genetic Algorithm (GA) to network security. As the transmission of data over the Internet increases, the need to protect connected systems also increases. Rule based network security is the latest technology used for this purpose. Although the field of network security is still developing, the systems that do exist are still not complete, in the sense that they are not able to detect all types of intrusions. Some attacks which are detected by various tools available today cannot be detected by other products, depending on the types and methods that they are built on. Using a Genetic Algorithm is one of the methods that detect intrusions. The focus of this paper is to introduce the application of GA, in order to improve the effectiveness of network security. Unlike other implementations of the same problem, this implementation considers both temporal and spatial information of network connections in encoding the network connection information into rules in network security. This is helpful for identification of complex anomalous behaviors. This work is focused on the TCP/IP network protocols.
Multicast communication is widely adopted in real-time applications today such as Audio, Video and Data transfer. Though various types of protocols for multicasting communication exist, they are not fully satisfied regarding with security. Still a lot of research works is being carried out to support the security services like confidentiality, authentication, non-repudiation, integrity and access-control.
Most of the applications need the source authentication of the multicast information even after packet loss like video conferencing. In this paper, we first present the structure and applications of multicast communication. Then, we focus some of the recent authentication techniques for multicast stream flow. Finally, we will discuss about our proposed Protocol that authenticates the source of the multicast flow with non-repudiation and tolerates packet loss using redundant hash-chaining technique.
A prototype of intelligent intrusion detection system (IIDS) to demonstrate the effectiveness of data mining techniques that utilize fuzzy logic and genetic algorithms. This system combines both anomaly based intrusion detection using fuzzy data mining techniques and misuse detection using traditional rule-based expert system techniques. The anomaly-based components are developed using fuzzy data mining techniques. They look for deviations from stored patterns of normal behavior. Genetic algorithms are used to tune the fuzzy membership functions and to select an appropriate set of features. The misuse detection components look for previously described patterns of behavior that are likely to indicate an intrusion. Both network traffic and system audit data are used as inputs for both components.
A methodology has been proposed to extend the desirers of people with large covered WLAN with the help of IAPP protocol and self designed antennas. The IAPP is a communication protocol used by the management entity of an AP to communicate with other APs and which will provide a unified solution for both intra and intersubnet handoff processes. The proposed enhancement relies on the access point's interoperability with other APs, provided by the IP-based IAPP, so as to enable the intra and intersubnet link-layer frame buffering-and-forwarding. IAPP is an IEEE 802.11f standard which is a part of IEEE 802.11 is designed for the enforcement of unique association throughout an ESS and for secure exchange of stations security context between current AP and new AP during the handoff period. It is simulated with self-designed IAPP software which is portable to different operating systems and wireless chipsets using well-defined external interface. The performance of IAPP measured, compared and explained with the help of graphical representations.
Electrical distribution network reconfiguration is a complex optimization process aimed at finding a radial operating structure that minimizes the system power loss while satisfying operating constraints. Network reconfiguration for time varying loads is very complex and extremely non-linear optimization, which can be effectively, solved using Genetic Algorithm (GA). Because of the faults and after isolating the fault, there are unfaulted sections, which are left without supply. It is required to quickly restore supply to these unfaulted sections of distribution systems. During a fault, switches are used for fault isolation and service restoration. This paper presents a simple method to solve online network reconfiguration problem for loss reduction and service restoration using GA. By using the proposed algorithm, a more efficient online network reconfiguration can be obtained to reduce losses. The loads can be restored as much as possible by transferring de-energized loads to other supporting distribution feeders without violating operating constraints. The effectiveness of the proposed method is demonstrated with 16-node test system. The method suggested is very simple for feeder reconfiguration and service restoration.
This Work presents some deeper insights on the state-of-the-art in block cipher design. This is mainly done by assessment of the evaluation process of the AES (Advanced Encryption Standard). We conclude (with may be a little bit surprising result) that the required security level, for a block cipher to be used for the present and foreseeable future, may be under estimated during AES evaluation. In accordance, we propose a new block cipher that we call Nahrainfish, which we believe that it offers the required security level without a big sacrifice in efficiency and other related criteria. Instead of building Nahrainfish totally from scratch, we have made a benefit mainly from some AES finalists to develop the new cipher by an over-engineering approach leading to the required higher security level. Nahrainfish is a classical Feistel network based on a novel combination of both key-dependent S-boxes and data-dependent rotations. It operates on 128-bit blocks and accepts a variable key length up to 1024 bits. The paper also includes some important notes on the security and performance of the cipher.
This paper presents a dynamic programming algorithm for identification and labeling for intrinsic and extrinsic factors of face appearance. The novelty of the proposed technique is based on a new combination of mapping network, called wavenet-network (WN) and Inverse Discrete Multi-Wavelet Transform (IDMW). Wavenet is induced by combining the wavelet transform model with the basic concept of neural networks. The new mapping network called wavenets is proposed as an alternative method to feed forward neural networks to approximate the arbitrary nonlinear functions. Wavenet (WN) was employed to make approximation to the images before passing through the Inverse Discrete Multi-Wavelet Transform (IDMW) decomposition to extract image descriptive features. These features are used in neural networks of the proposed image identification algorithm to define the test image. A successful identification rate of: 99% was achieved with this approach for the intrinsic factors and 93% was achieved with this approach for the extrinsic factors. The algorithm is implemented using MATLAB programming languages version 7.
Consumption of power has become an important issue for modern COMPUTING systems [1]. Research result shows that off chip busses consumes considerable amount of power. Researchers suggested that one effective way to reduce power consumption is to reduce bus activities [2]. Power dissipation in CMOS circuits during inactive periods (static power) has become a significant part of the total power dissipation. Transition on high capacitance busses in VLSI systems results in considerable dissipation. Various coding schemes have been proposed in literature to encode data in order to reduce the number of bus transition [3][4][5]. Few method gives tremendous result 50% reduction in I/O average power dissipation and 25% reduction in I/O average power dissipation. In this paper we derived a new coding method, which leads to extremely easy practical way, which reduces number of bus transition. In this proposed scheme all bits of communication system is considered at once, and there is no need to divide bus systems into segments. Simulation result of proposed scheme shows that our concept reduces transition activities by 24.
A mobile ad hoc network is a self-organizing and rapidly deployable network in which neither a wired backbone nor a centralized control exists, without using any pre-defined topology and pre-defined infrastructure. The goal of an ad-hoc wireless network is to enable communication between any two wireless connected nodes in the network. Using intermediate nodes in the network as forwarding agents enables communication between nodes that are beyond direct communication range. Ad hoc wireless networks are also more prone to security threats and misbehaving nodes. One more problem that we cannot predict in the ad hoc wireless network is misbehaving nodes. Generally a good network must contain all the nodes with cooperative in nature. If any node that has a strong motivation to deny packet forwarding to others, while at the same time using their services to deliver own data, leads more complication and problems in the ad hoc wireless networks. These nodes are some time called as selfish nodes.
In this paper we propose a Path Management Protocol on Ad hoc Wireless Network (PMP-ANT) designed based on the MARI topology, to cope with misbehavior nodes. In this approach we use PMP-ANT protocol to detect misbehaving nodes and to isolate them from the network, so that misbehavior will not pay off but result in denied service and thus cannot continue. PMP-ANT detects misbehaving nodes by means of direct observation and second-hand information about several types of misbehavior and also using the reputation system and Trust records.