Posts

Showing posts from March, 2018

Vertical Fragmentation of Location Information to Enable Location Privacy in Pervasive Computing

Jeeva Susan Jacob1 and Preetha K.G2 1 Rajagiri School of Engineering and Technology, Rajagiri Valley, Cochin, India  2 Rajagiri School of Engineering and Technology, Rajagiri Valley, Cochin, India  Abstract The aim of the development of Pervasive computing was to simplify our lives by integrating communication technologies into real life. Location aware computing which is evolved from pervasive computing performs services which are dependent on the location of the user or his communication device. The advancements in this area have led to major revolutions in various application areas, especially mass advertisements. It has long been evident that privacy of personal information, in this case location of the user, is rather a touchy subject with most people. This paper explores the Location Privacy issue in location aware computing. Vertical fragmentation of the stored location information of users has been proposed as an effective solution for this issue.  ...

Evaluating the Quality of Software in ERP Systems Using the ISO 9126 Model

Thamer A. Alrawashdeh, Mohammad Muhairat and Ahmad Althunibat Department of software Engineering, Alzaytoonah University of Jordan, Amman, Jordan  Abstract This paper presents the quality model of enterprise resource planning (ERP) systems by adapting the ISO9126 standard. This model is used to verify that whether the implementation of ERP systems will succeed or fail in higher educational institutions. Six quality characteristics are suggested to be minimum requirements for creating the quality model of ERP systems, including functionality, reliability, usability, efficiency, maintainability, and portability of ERP systems. The quality characteristics could not be measured directly. Thus in this study, they are divided into twenty seven subcharacteristics.  Keyword  Software Quality models, Software Quality Characteristics and ERP systems Quality Model. More Details :   http://airccse.org/journal/ijasa/papers/0313asa01.pdf

A NEW APPROACH IN POSITION-BASED ROUTING PROTOCOL USING LEARNING AUTOMATA FOR VANETS IN CITY SCENARIO

Fatemeh Teymoori1 ,Hamid Nabizadeh1 andFarzaneh Teymoori2 1 Shahid Beheshti University, G. C., Tehran, Iran  2 Science and Research Branch of Islamic Azad University, Tehran, Iran   ABSTRACT  One of the main issues in Vehicular Ad-hoc NETworks (VANETs) is providing a reliable and efficient routing in urban scenarios with regard to the high vehicle mobility and presence of radio obstacle. In this paper, we propose a Position-Based routing protocol using Learning Automata (PBLA). In addition, PBLA uses the traffic information for enhancing learning. As we know, a main characteristic of learning is increasing performance over time. We exploit this characteristic to decreasing use of traffic information. Initially, PBLA make effort to finding best and shortest path to mobile destination using traffic information.  KEYWORDS   Vehicular Adhoc NETworks, Routing Protocol, Position-Based Routing, Learning Automata   More Details ...

An Enhanced Bio-Stimulated Methodology to Resolve Shop Scheduling Problems

Divya. P, Narendhar. S and Ravibabu. V Department of Computer Applications, School of Computer Science and Engineering, Bharathiar Universiy, Coimbatore, Tamil Nadu, INDIA  Abstract  This paper symbolizes the efficiency of Customized Bacterial Foraging Optimization algorithm. In this research work, Bacterial Foraging Optimization was combined with Ant Colony Optimization and a new technique Customized Bacterial Foraging Optimization for solving Job Shop Scheduling, Flow Shop Scheduling and Open Shop Scheduling problems were suggested. The Customized Bacterial Foraging Optimization was tested on the Benchmark instances and randomly created instances. From the implementation of this research work, it could be observed that the proposed Customized Bacterial Foraging Optimization was effective than Bacterial Foraging Optimization algorithm in solving Shop Scheduling Problems. Customized Bacterial Foraging Optimization can also be used to resolve real world Shop Sched...

SIP OVERLOAD CONTROL TESTBED: DESIGN, BUILDING AND EVALUATION

Ahmad reza Montazerolghaem1 , Mohammad Hossein Yaghmaee2 1,2Department of Computer Engineering, Ferdowsi University of mashhad, Mashhad, Iran ABSTRACT  Having facilities such as being in text form, end-to-end connection establishment, and being independence from the type of transmitted data, SIP protocol is a good choice for signaling protocol in order to set up a connection between two users of an IP network. Although utilization of SIP protocol in a wide range of applications has made various vulnerabilities in this protocol, amongst which overload could make serious problems in SIP servers. A SIP is overloaded when it does not have sufficient resources (majorly CPU processing power and memory) to process all messages. In this paper the window-based overload control mechanism which does not require explicit feedback is developed and implemented on Asterisk open source proxy and evaluated. The results of implementation show that this method could practically maintain...

APPLICATION OF ANDROID ENABLED MOBILE DEVICE FOR PERSONAL INFORMATION SYSTEMS

Duarte-Rhian Nicely1 and Suresh Sankaranarayanan2,3 1Department of Computing, University of WestIndies, Kingston,  2Computing and Information Systems, Institut Teknologi Brunei, Brunei 3Department of Computing, University of WestIndies, Kingston, Jamaica  ABSTRACT  The advent of Mobile technology is indicative of an era in which society requires the transfer of information via a medium that facilitates mobility. Therefore, it is widely accepted that Mobile Information Systems have been in use in a number of situations where access to information is required while on the move. However, deeper analysis has revealed that mobile information systems are mainly concerned with providing generic information to users without much scope for customization. This has created a need to develop what is called Personal Information Systems. It can be viewed as an empowering tool for users based on their input into the system as they can enhance the level of information supp...

BLOSEN: BLOG SEARCH ENGINE BASED ON POST CONCEPT CLUSTERING

S. Shanmugapriyaa1 , K.S.Kuppusamy2 , G. Aghila3 1Department of Computer Science, School of Engineering and Technology, Pondicherry University, Pondicherry, India  ABSTRACT  This paper focuses on building a blog search engine which doesn’t focus only on keyword search but includes extended search capabilities. It also incorporates the blog-post concept clustering which is based on the category extracted from the blog post semantic content analysis. The proposed approach is titled as “BloSen (Blog Search Engine)” It involves in extracting the posts from blogs and parsing them to extract the blog elements and store them as fields in a document format. Inverted index is being built on the fields of the documents. Search is induced on the index and requested query is processed based on the documents so far made from blog posts. It currently focuses on Blogger and Wordpress hosted blogs since both these hosting services are the most popular ones in the blogosphere. Th...

A KEY LEVEL SELECTION WITHIN HASH CHAINS FOR THE EFFICIENT ENERGY CONSUMPTION IN WSNS

Hyun Woo Lee1 , Su Man Nam2 and Tae Ho Cho3 123College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea  ABSTRACT  A wireless sensor network is composed of a base station (BS) and numerous sensor nodes. The sensor nodes lack security because they operate in an open environment, such as the military. In particular, a false report injection attack captures and compromises sensor nodes. The attack then causes the compromised nodes to generate forward false reports. Owing to the false report injection attack, not only does the sensor network have a false alarm, but its limited energy is also drained. In order to defend the false report injection attack, over the past few years, several studies have been made looking for a solution to the attack. Ye et al. studied statistical en-route filtering (SEF). SEF is a method of stochastically verifying event reports in the en-route filtering phase. SEF can filter many fal...

SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC

Su Man Nam and Tae Ho Cho College of Information and Communication Engineering, Sungkyunkwan University, Suwon, 440-746, Republic of Korea  ABSTRACT  Wireless sensor networks are easily compromised by an adversary, such as fabricated with false votes attacks and false votes on real reports attacks. These attacks generate false data to drain the energy resource of sensors and interrupt the inflow of a real report. PVFS was proposed to detect them by verifying votes in the real report. When a real event occurs, a cluster head collects all of the votes from its neighboring nodes and selects the votes up to a defined number of votes. In this paper, our proposed method decides the number of votes based on a fuzzy rule-based system to improve energy savings as compared to PVFS. We evaluated the effectiveness of the proposal as two attacks occur simultaneously in the sensor network. The experimental results show that our method saves energy resources and maintains the s...

Improving Performance of Routing Protocols Using MRP Framework

Sohail Abid1, Shahab Khan2 1Department of Engineering and Management Foundation University, Pakistan. 2Department of Computing and Technology IQRA University Islamabad Campus Pakistan.  ABSTRACT  These days MANET (Mobile Ad-hoc Network) is an amazing remarkably altering or rising technology, for the reason that of its elite nature of scattered mobile devices and self-motivated network topology. The mobile ad-hoc routing protocol follows several principles in wireless MANET’s. The up to date and novel applications based on wireless technology are being produced in the private as well as commercial sectors. A lot of challenges which are facing wireless MANETs like network stability, security, energy efficiency and performance analysis etc. At present wireless ad-hoc network get much more attention because of its accessibility everywhere. As a result researchers produce several routing protocols. In this paper first of all we analyzed the performance investigation o...

A FRAMEWORK FOR SECURE HEALTHCARE SYSTEMS BASED ON BIG DATA ANALYTICS IN MOBILE CLOUD COMPUTING ENVIRONMENTS

Ahmed E. Youssef College of Computer & Information Sciences, King Saud University, Riyadh, KSA Faculty of Engineering, Helwan University, Cairo, Egypt  ABSTRACT  In this paper we introduce a framework for Healthcare Information Systems (HISs) based on big data analytics in mobile cloud computing environments. This framework provides a high level of integration, interoperability, availability and sharing of healthcare data among healthcare providers, patients, and practitioners. Electronic Medical Records (EMRs) of patients dispersed among different Care Delivery Organizations (CDOs) are integrated and stored in the Cloud storage area, this creates an Electronic Health Records (EHRs) for each patient. Mobile Cloud allows fast Internet access and provision of EHRs from anywhere and at any time via different platforms. Due to the massive size of healthcare data, the exponential increase in the speed in which this data is generated and the complexity of healthcar...

INTELLIGENT SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING CHAOS SYNCHRONIZATION FOR WIRELESS COMMUNICATION (CSCT)

Arindam Sarkar1 and J. K. Mandal2 Department of Computer Science & Engineering, University of Kalyani, W.B, India  ABSTRACT  In this paper a novel intelligent soft computing based cryptographic technique based on synchronization of two chaotic systems (CSCT) between sender and receiver has been proposed to generate session key using Pecora and Caroll (PC) method. Chaotic system has some unique features like sensitive to initial conditions, topologically mixing; and dense periodic orbits. By nature, the Lorenz system is very sensitive to initial conditions meaning that the error between attacker and receiver is going to grow exponentially if there is a very slight difference between their initial conditions. All these features make chaotic system as good alternatives for session key generation. In the proposed CSCT few parameters ( σ, b , r , x1 ,y2 and z2 ) are being exchanged between sender and receiver. Some of the parameter which takes major roles to form...

A Novel Approach for Preventing Black-Hole Attack in MANETs

Rashmi1 , Ameeta Seehra2 Department of Electronics and Communication Engineering, Guru Nanak Dev Engineering College, Ludhiana, Punjab, India  ABSTRACT  A black-hole attack in the Mobile Ad-hoc NETwork (MANET) is an attack occurs due to malicious nodes, which attracts the data packets by falsely advertising a fresh route to the destination. In this paper, we present a clustering approach in Ad-hoc On-demand Distance Vector (AODV) routing protocol for the detection and prevention of black-hole attack in MANETs. In this approach every member of the cluster will ping once to the cluster head, to detect the peculiar difference between the number of data packets received and forwarded by the node. If anomalousness is perceived, all the nodes will obscure the malicious nodes from the network.  KEYWORDS  Mobile Ad-hoc Networks, Black-hole attack, AODV, Routing Protocols, Security, Clustering, Cluster-head.  More Details :  http://airccse...

ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME

Jae Kwan Lee1 and Tae Ho Cho2 1, 2 College of Information and Communication Engineering, Sungkyunkwan University, Suwon 440-746, Republic of Korea  ABSTRACT  Wireless sensor networks (WSNs) are regularly deployed in harsh and unattended environments, and sensor nodes are easily exposed to attacks due to the random arrangement of the sensor field. An attacker can inject fabricated reports from a compromised node with false votes and false vote-based reports. The false report attacks can waste the energy of the intermediate nodes, shortening the network lifetime. Furthermore, false votes cause the filtering out of legitimate reports. A probabilistic voting-based filtering scheme (PVFS) was proposed as a countermeasure against this type of attacks by Li and Wu. PVFS uses a vote threshold, a security threshold, and a verification node. The scheme does not make additional use energy or communications resources because the verification node and threshold values are fixed...

REVIEW ON CLASSIFICATION BASED ON ARTIFICIAL NEURAL NETWORKS

Saravanan K1 and S. Sasithra2 1Assistant Professor/Department of Computer Engineering, Erode Sengunthar Engineering College, Erode, India 2 Department of Computer Engineering, Erode Sengunthar Engineering College, Erode, India  ABSTRACT  Artificial neural networks (ANN) consider classification as one of the most dynamic research and application areas. ANN is the branch of Artificial Intelligence (AI). The neural network was trained by back propagation algorithm. The different combinations of functions and its effect while using ANN as a classifier is studied and the correctness of these functions are analyzed for various kinds of datasets. The back propagation neural network (BPNN) can be used as a highly successful tool for dataset classification with suitable combination of training, learning and transfer functions. When the maximum likelihood method was compared with backpropagation neural network method, the BPNN was more accurate than maximum likelihood meth...

SELECTING NUMBER OF FORWARDING REPORTS TO IMPROVE ENERGY SAVINGS IN BANDWIDTH EFFICIENT COOPERATIVE AUTHENTICATIONS FOR SENSOR NETWORKS

Su Man Nam1 and Tae Ho Cho2 1,2College of Information Communication Engineering, Sungkyunkwan University, Suwon, 400-746, Republic of Korea  ABSTRACT   Wireless sensor networks provide ubiquitous computing systems in various open environments. In the environment, sensor nodes can easily be compromised by adversaries to generate injecting false data attacks. The injecting false data attack not only consumes unnecessary energy in en-route nodes, but also causes false alarms at the base station. To detect this type of attack, a bandwidth-efficient cooperative authentication (BECAN) scheme was proposed to achieve high filtering probability and high reliability based on random graph characteristics and cooperative bit-compressed authentication techniques. This scheme may waste energy resources in en-route nodes due to the fixed number of forwarding reports. In this paper, our proposed method effectively selects a dynamic number of forwarding reports in the source node...

ANDROID BASED SECURITY AND HOME AUTOMATION SYSTEM

Sadeque Reza Khan1 and Farzana Sultana Dristy2 1Department of Information and Communication Engineering, Chosun University, Korea 2Department of Computer Science and Engineering, Varendra Universty, Bangladesh  ABSTRACT  The smart mobile terminal operator platform Android is getting popular all over the world with its wide variety of applications and enormous use in numerous spheres of our daily life. Considering the fact of increasing demand of home security and automation, an Android based control system is presented in this paper where the proposed system can maintain the security of home main entrance and also the car door lock. Another important feature of the designed system is that it can control the overall appliances in a room. The mobile to security system or home automation system interface is established through Bluetooth. The hardware part is designed with the PIC microcontroller.  KEYWORDS  Adapter; UUID; MAC;GSM; RS-232. More ...

AN IMPERATIVE FOCUS ON SEMANTIC WEB PRINCIPLES, LOGICS AND ITS APPLICATION

N. Senthil Kumar 1 and Dr. Dinakaran M 2 School of Information Technology & Engineering VIT University, Vellore, Tamil Nadu, India  ABSTRACT  The World Wide Web is booming and radically vibrant due to the well established standards and widely accountable framework which guarantees the interoperability at various levels of the application and the society as a whole. So far, the web has been functioning at the random rate on the basis of the human intervention and some manual processing but the next generation web which the researchers called semantic web, edging for automatic processing and machine-level understanding. The well set notion, Semantic Web would be turn possible if only there exists the further levels of interoperability prevails among the applications and networks. In achieving this interoperability and greater functionality among the applications, the W3C standardization has already released the well defined standards such as RDF/RDF Schema and ...

A STUDY ON DEVELOPING A SMART ENVIRONMENT IN AGRICULTURAL IRRIGATION TECHNIQUE

Angel C and Asha S School of Computing Science and Engineering, VIT University, Chennai, Tamil Nadu  ABSTRACT   Maintaining a good irrigation system is a necessity in today’s water scarcity environment. This paper describes a new approach for automated Smart Irrigation (SIR) system in agricultural management. Using various types of sensors in the crop field area, temperature and moisture value of the soil is monitored. Based on the sensed data, SIR will automatically decide about the necessary action for irrigation and also notifies the user. The system will also focus on the reduction of energy consumption by the sensors during communication.  KEYWORDS  Smart Irrigation, Intelligent Irrigation, Precision Agriculture   More Details :  http://airccse.org/journal/ijasa/papers/3315ijasa02.pdf

A REVIEW ON DDOS PREVENTION AND DETECTION METHODOLOGY

Subramaniam.T.K1 and Deepa.B2 1M.E.Scholar, Department of Computer Science & Engineering Nandha Engineering College, Erode, Tamil Nadu, India 2Assistant Professor, Department of Computer Science & Engineering, Nandha Engineering College, Erode, Tamil Nadu, India  ABSTRACT  Denial of Service (DoS) or Distributed-Denial of Service (DDoS) is major threat to network security. Network is collection of nodes that interconnect with each other for exchange the Information. This information is required for that node is kept confidentially. Attacker in network computer captures this information that is confidential and misuse the network. Hence security is one of the major issues. There are one or many attacks in network. One of the major threats to internet service is DDoS (Distributed denial of services) attack. DDoS attack is a malicious attempt to suspending or interrupting services to target node. DDoS or DoS is an attempt to make network resource or the machine...

TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENT

Clement Duhart1,2 and Cyrille Bertelle2 1 ECE Paris, LACSC, France 2Normandie Univ, LITIS, FR CNRS 3638, Le Havre University, France  ABSTRACT The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment. The underlying idea is that such systems must have self-x properties in order to adapt their behavior to external disturbances with a hig...

A SCRUTINY TO ATTACK ISSUES AND SECURITY CHALLENGES IN CLOUD COMPUTING

Subramaniam.T.K1, Deepa.B2 1M.E.Scholar, Department of Computer Science & Engineering Nandha Engineering College, Erode, Tamil Nadu, India 2Assistant Professor, Department of Computer Science & Engineering, Nandha Engineering College, Erode, Tamil Nadu, India  ABSTRACT  Cloud computing is an anthology in which one or more computers are connected in a network. Cloud computing is a cluster of lattice computing, autonomic computing and utility computing. Cloud provides an on demand services to the users. Many numbers of users access the cloud to utilize the cloud resources. The security is one the major problem in cloud computing. Hence security is a major issue in cloud computing. Providing security is a major requirement of cloud computing. The study enclose all the security issues and attack issues in cloud computing.  KEYWORDS  Grid computing, autonomic computing   More Details :  http://aircconline.com/ijasa/V4N1/41...