Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
It has been recognised, that there is a need to employ improved development methods when designing Manufacturing Automation Systems. This need is addressed in part by the implementation of the IEC 61131-3 Standard. Best development practices require that control systems for Programmable Logic Controllers (PLCs) and Process Automation to be developed in a manner that engenders modularity and reuse. Development methodologies such as the Object Modelling Technique (OMT) and the Booch Method have previously been investigated. This paper sets out the basis for the suitability of UML and modelling in programming in the Manufacturing Automation sector of electronics.
Network Intrusion detection systems aim is detecting attacks against computer systems and networks. This paper focuses on the development of Genetic Algorithm in Intrusion Detection System (GAIDS). Genetic Algorithms can provide appropriate heuristic search methods. However, balancing the need to detect all possible attacks found in network with the need to avoid false positives is a challenge, given the scalar fitness values required by Genetic Algorithms. This study discusses a fitness function independent of variable parameters to overcome this problem. This fitness function allows the IDS to significantly reduce both its false positive and false negative rate.
Fieldbus networks, as a part of distributed control applications, are subjected to harsh environment that may cause different faulty conditions. This is more pronounced in the case of hybrid wired/wireless networks because of the high susceptibility of wireless communication to such environment. PROFIBUS as one of the widely applied fieldbus protocols is considered here. Consequently, a timing analysis for hybrid wired/wireless PROFIBUS networks under a bounded error model is proposed. In this context, two alternatives for Hybrid Wired/Wireless - Multiple Logical Rings (MLR) - are discussed on the base of a single PROFIBUS network — the Single Logical Ring (SLR) - analysis. This work is essential to assess the real-time behaviour of such a PROFIBUS network under the incidence of errors.
People get connected with their friends and relatives, at the same time some new friendships and relationships may form in day-to-day life. The same principle gives the basic idea behind developing a Mesh Network. Mesh Network is a complete on-demand and meshed ad-hoc network. Mesh networking provides an innovative method to build complex data networks very easily. Mesh Networking is particularly suited to wireless networks, where the connections can't be predicted in the same way as a wired network, catering for mobile nodes, instant growth and unpredictable variations in reception and coverage. As each mesh node is autonomous, discovering routes on demand, without central control to act as a bottleneck. Routes are established on demand, and un-used routes are flushed out after a short time. Meshing is a fundamentally different approach to routing through networks, and does not follow the conventions of network design. The node may discover many potential routes through the network, and it will select the most suitable route based upon the shortest distance to reach the other node. In this paper we are discussing the possibilities of meshing in indoor and outdoor environments and locating the mobile user with the help of self designed application and sniffers. We also simulated our work with Pamvotis WLAN simulator.
Asynchronous Transfer Mode (ATM) is widely used in telecommunications systems to send data, video and voice at a very high speed. In ATM network optimizing the bandwidth through dynamic routing is an important consideration. Previous research work shows that traditional optimization heuristics result in suboptimal solution. In this paper we have explored non-traditional optimization technique. We propose comparison of two such algorithms - Genetic Algorithm (GA) and Multi-Source Virtual Dynamic Routing Algorithm (MSVDR), based on non-traditional Optimization approach, for solving the dynamic routing problem in ATM networks which in return will optimize the bandwidth. The optimized bandwidth could mean that some attractive business applications would become feasible such as high speed LAN interconnection, teleconferencing etc. We have also performed a comparative study of the selection mechanisms in MSVDR and listed the best selection mechanism and a new initialization technique which improves the efficiency of the MSVDR.
Remote user authentication and key agreement scheme using smartcards is a very practical solution to validate the eligibility of a remote user and provide secure communication later. In this paper, we propose an efficient dynamic-id based remote user authentication and key agreement scheme using smartcards. The major merits of this scheme include, the scheme does not need any verification table, users can freely choose and change their passwords, the computation and communication costs are very low as our scheme uses one-way hash functions, block ciphers and smartcards. In addition the scheme offers mutual authentication between servers and users and it is a nonce based scheme which does not have a serious time-synchronization problem. The scheme is secure against Id-theft, can resist against replay attacks, stolen verifier attacks, guessing attacks, reflection attack and offers forward secrecy and known-key security.
With the improvements in the quality of Commercial-Off-The-Shelf (COTS) printing and scanning devices, the ability to counterfeit documents has become a widespread problem. Consequently, there has been an increasing demand to develop digital watermarking techniques which can be applied to both electronic and printed images (and documents) that can be authenticated, prevent unauthorized copying and withstand abuse and degradation. In this paper, a new approach to digital watermarking is presented and a range of possible applications considered. The process is defined by using concepts and techniques borrowed from Cryptography. It is based on computing a ‘scramble image’ by diffusing a watermark image with a noise field (a cipher). The cover image (covertext) is then introduced using a simple additive process (confusion). The watermark is subsequently recovered by removing the covertext and then correlating the output with the original (key dependent) noise field. For covert encryption, this approach provides the user with a method of hiding ciphertext (the scrambled image) in a host image before transmission of the data. With regard to document authentication, we consider a diffusion only or ‘texture coding’ approach that is robust to a wide variety of attacks including geometric attacks, crumpling, and print/scan attacks are considered.
In general, alphanumeric passwords are used for remote user authentication. But, these are vulnerable to security and usability problems. To solve these problems, wei-chi-ku et. al. proposed “Remote user authentication scheme using strong Graphical passwords” which are not resistant to shoulder-surfing attack, a critical problem of graphical passwords. This paper presents a Dynamic ID-based remote user authentication scheme which is resistant to shoulder surfing attack and it also achieves mutual authentication. This paper also makes a comparison of usability and security aspects of the proposed scheme with wei-chi-ku et al. scheme.
This paper presents a methodology based on the integration of the fuzzy logic to solve multi-selection problem. To this end, it took the introduction of fuzzy logic at the multi-criteria methods taking into account the limitations. This turn gave birth to a fuzzy new approach based on combination of the multi-criteria method “Fuzzy Analytical Hierarchy Process” (FAHP) and the “Goal Programming” (GP) in order to take into account at the same time the quantitative and qualitative factors and the reliability. Better yet, bearing in mind the reliability concept and fuzzy constraints, we were proposed to introduce fuzzy logic at the GP method. This gave birth to the “Fuzzy Goal Programming” (FGP). This logic has also been integrated into a System Aid Decision (SAD) based on fuzzy expert system. Indeed, the fuzzy expert system thus obtained helps the user's in making the decision without much care for the method to be used. Two numerical examples in two different sectors are presented to illustrate this new approach which includes the fuzzy expert system. The achieved results have shown the importance of the integration of fuzzy logic in the classical multi-criteria methods.