Design and Evaluation of Parallel Processing Techniques for 3D Liver Segmentation and Volume Rendering
Ensuring Software Quality in Engineering Environments
New 3D Face Matching Technique for an Automatic 3D Model Based Face Recognition System
Algorithmic Cost Modeling: Statistical Software Engineering Approach
Prevention of DDoS and SQL Injection Attack By Prepared Statement and IP Blocking
Describing the structure of a language using rewriting rules in verifying requirements and design is still a vivid area of research. The authors describe the grammar formalism Extended Backus Naur Form (EBNF) to specify the 'if' single block construct with respect to assignment and relational operators as well as Switch, For loop, Do-while, and While loop statement to ensure program free flow. This aim to ensure correctness in the grammar rule for selective and iterative construct to parse C++ programs. The grammar describes the actions a parser must take to parse a string of tokens correctly.
Electronic voting has become the most preferred and generally acceptable voting method in the 21st century. Advanced and developed countries are constantly reviewing their e-voting systems. However, the cyber security problem associated with the e-voting system has been giving concerns to cyber security experts and researchers. The authentication methods employed in existing e-voting system is for a voter to input a unique identification number that has been assigned after accreditation. This is to confirm of the voter's details in the voter registration data base. This paper seeks to develop a secured e-voting system that integrates a second order authentication in the form of One-Time Password to again confirm the voters' details in the registration data base before voting is allowed. Java programming language was employed in coding the OTP algorithm into the existing e-voting system algorithm. The e-voting system is more secure with this work.
Ransomware is advanced malicious software which comes in different forms, with the intention to attack and take control of basic infrastructures and computer systems. The majority of these threats are meant to extort money from their victims by asking for a ransom in exchange for decryption keys. Most of the techniques deployed to detect this could not completely prevent ransomware attacks because of its obfuscation techniques. In this research work, an intelligent crypto-locker ransomware detection technique using Support Vector Machine (SVM) and Grey Wolf Optimization (GWO) algorithm is proposed to overcome the malware obfuscation technique because of its ability to learn, train and fit dataset based on the observed features. The proposed technique has shown remarkable prospects in detecting cryptolocker ransomware attacks with high true positive and low false positive rate.
The undue anxiety of students towards examination being conducted using Computer Base Testing System (CBTS) has led to the introduction of computer base mock examination; a way of familiarizing students with CBT platform before attempting the main examination. The current system is plagued with applicants traveling from various location to a Computer Base Testing Center to take part in a short-lived mock examination in order to familiarize them with the CBT platform; most of the applicants do not have access to the CBT software which is not available online; it has been argued that a thirty-minute brief mock test is not adequate enough to familiarize the use of CBT for some of the candidates. This paper is proposing the development of Online Pre-admission Examination Learning and Practicing Software (ELPS) for the prospective students of Federal University of Technology, Minna. The proposed system will be implemented using Microsoft Visual Studio. Net, Integrated Development Environment. The proposed web based application will be highly user-friend and self-intuitive to help applicants in learning and practicing the computer based test questions from anywhere, any time.
Software Testing is very important and time intense portion of the software development life cycle as its persistence is to perceive failures in software, so that flaws may be improved and adjusted at the initial stage. Software Testing is a practice for approving that the product/software/program, that has been developed by programmers/coder, is an excellent or quality creation and to guarantee that the synthetic product is functioning and agreeing to the requirement, satisfying the consumer/client needs. There are many approaches to software testing. Testing is a procedure of training a program with precise intent of discovering errors before preceding its delivery to end user. Software Testing is the method of performing a program to locate an error. This paper defines generally used software testing techniques for identifying error and they are white box testing, black box testing and grey box testing. Software testing, in cooperation in terms of quality excellence and consistency, is very essential. In this article, authors describe the testing software and its objectives and testing altered software, debugging software. After a full explanation of software testing, test methods include Black Box and White Box and Gray Box delivered and the variances and advantages and disadvantages of the three methods calculated. And well methods have acknowledged three methods of software testing.
Over the last few years, e governance in India has made rapid progress and adopted global best practices in terms of citizen-centricity, reach, connectivity, efficiency, transparency, accountability and availability. Multiple modes and ease of access, seamless connectivity and availability, user friendliness and efficiency of e-governance services have opened up avenues making e-governance services most prone to serious security risks. International trends and domestic experiences show that the e-governance services are constant targets of organized crime by hackers and prominent government sites are being probed daily. The security threat landscape for e-governance applications constantly changes and new type of vulnerabilities keeps manifesting. In today's race to build cutting-edge e-governance business solutions, web applications are being developed and deployed with lesser attention to critical and widespread security threats. The government can no longer afford to tolerate security issues with high risk values, which could hinder delivery of services and impact the confidentiality, integrity and availability of information. To mitigate with appropriate countermeasures and security controls, it is required to evaluate and estimate risks associated with e-governance applications security issues that can be exploited. In this context, this paper outlines the risk rating methodology from e-governance perspective to estimate risk associated with security issues at application layer that are critical and widespread.