Abstract: Wireless sensor network (WSN) is a network of many interconnected networked systems, they equipped with energy resources and they are used to detect other physical characteristics. On WSN, there are many researches are performed in past decades. WSN applicable in many security systems govern by military and in many civilian related applications. Thus, the security of WSN gets attention of researchers and gives an opportunity for many future aspects. Still, there are many other issues are related to deployment and overall coverage, scalability, size, energy efficiency, quality of service (QoS), computational power and many more. In this paper we discus about various applications and security related issue and requirements of WSN.
Abstract: Augmented Reality is a technology that involves the
overlay of virtual content, which is context or environment sensitive,
on images of the physical world in real time. This paper presents the
development of a catalog system that facilitates and allows the
creation, publishing, management and exploitation of augmented
multimedia contents and Augmented Reality applications, creating an
own space for anyone that wants to provide information to real
objects in order to edit and share it then online with others. These
spaces would be built for different domains without the initial need of
expert users. Its operation focuses on the context of Web 2.0 or
Social Web, with its various applications, developing contents to
enrich the real context in which human beings act permitting the
evolution of catalog’s contents in an emerging way.
Abstract: This paper describes a logical method to enhance
security on the grid computing to restrict the misuse of the grid
resources. This method is an economic and efficient one to avoid the
usage of the special devices. The security issues, techniques and
solutions needed to provide a secure grid computing environment are
described. A well defined process for security management among
the resource accesses and key holding algorithm is also proposed. In
this method, the identity management, access control and
authorization and authentication are effectively handled.
Abstract: Skin detection is an important task for computer
vision systems. A good method of skin detection means a good and
successful result of the system.
The colour is a good descriptor for image segmentation and
classification; it allows detecting skin colour in the images. The
lighting changes and the objects that have a colour similar than skin
colour make the operation of skin detection difficult.
In this paper, we proposed a method using the YCbCr colour space
for skin detection and lighting effects elimination, then we use the
information of texture to eliminate the false regions detected by the
YCbCr skin model.
Abstract: Key frame extraction methods select the most
representative frames of a video, which can be used in different areas
of video processing such as video retrieval, video summary, and video
indexing. In this paper we present a novel approach for extracting key
frames from video sequences. The frame is characterized uniquely by
his contours which are represented by the dominant blocks. These
dominant blocks are located on the contours and its near textures.
When the video frames have a noticeable changement, its dominant
blocks changed, then we can extracte a key frame. The dominant
blocks of every frame is computed, and then feature vectors are
extracted from the dominant blocks image of each frame and arranged
in a feature matrix. Singular Value Decomposition is used to calculate
sliding windows ranks of those matrices. Finally the computed ranks
are traced and then we are able to extract key frames of a video.
Experimental results show that the proposed approach is robust
against a large range of digital effects used during shot transition.
Abstract: Frequency stability of microgrids under islanded
operation attracts particular attention recently. A new cooperative
frequency control strategy based on centralized multi-agent system
(CMAS) is proposed in this study. Based on this strategy, agents sent
data and furthermore each component has its own to center operating
decisions (MGCC).After deciding on the information, they are
returned. Frequency control strategies include primary and secondary
frequency control and disposal of multi-stage load in which this study
will also provide a method and algorithm for load shedding. This
could also be a big problem for the performance of micro-grid in
times of disaster. The simulation results show the promising
performance of the proposed structure of the controller based on
multi agent systems.
Abstract: This paper proposes the designing direct adaptive
neural controller to apply for a class of a nonlinear pendulum
dynamic system. The radial basis function (RBF) neural adaptive
controller is robust in presence of external and internal uncertainties.
Both the effectiveness of the controller and robustness against
disturbances are importance of this paper. The simulation results
show the promising performance of the proposed controller.
Abstract: Artificial Immune Systems (AIS), inspired by the
human immune system, are algorithms and mechanisms which are
self-adaptive and self-learning classifiers capable of recognizing and
classifying by learning, long-term memory and association. Unlike
other human system inspired techniques like genetic algorithms and
neural networks, AIS includes a range of algorithms modeling on
different immune mechanism of the body. In this paper, a mechanism
of a human immune system based on apoptosis is adopted to build an
Intrusion Detection System (IDS) to protect computer networks.
Features are selected from network traffic using Fisher Score. Based
on the selected features, the record/connection is classified as either
an attack or normal traffic by the proposed methodology. Simulation
results demonstrates that the proposed AIS based on apoptosis
performs better than existing AIS for intrusion detection.
Abstract: Wireless sensor network is vulnerable to a wide range
of attacks. Recover secrecy after compromise, to develop technique
that can detect intrusions and able to resilient networks that isolates
the point(s) of intrusion while maintaining network connectivity for
other legitimate users. To define new security metrics to evaluate
collaborative intrusion resilience protocol, by leveraging the sensor
mobility that allows compromised sensors to recover secure state
after compromise. This is obtained with very low overhead and in a
fully distributed fashion using extensive simulations support our
findings.
Abstract: The Quad Tree Decomposition based performance
analysis of compressed image data communication for lossy and
lossless through wireless sensor network is presented. Images have
considerably higher storage requirement than text. While transmitting
a multimedia content there is chance of the packets being dropped
due to noise and interference. At the receiver end the packets that
carry valuable information might be damaged or lost due to noise,
interference and congestion. In order to avoid the valuable
information from being dropped various retransmission schemes have
been proposed. In this proposed scheme QTD is used. QTD is an
image segmentation method that divides the image into homogeneous
areas. In this proposed scheme involves analysis of parameters such
as compression ratio, peak signal to noise ratio, mean square error,
bits per pixel in compressed image and analysis of difficulties during
data packet communication in Wireless Sensor Networks. By
considering the above, this paper is to use the QTD to improve the
compression ratio as well as visual quality and the algorithm in
MATLAB 7.1 and NS2 Simulator software tool.
Abstract: Many studies have revealed the fact of the complexity
of ontology building process. Therefore there is a need for a new
approach which one of that addresses the socio-technical aspects in the
collaboration to reach a consensus. Meta-design approach is
considered applicable as a method in the methodological model of
socio-technical ontology engineering. Principles in the meta-design
framework are applied in the construction phases of the ontology. A
web portal is developed to support the meta-design principles
requirements. To validate the methodological model semantic web
applications were developed and integrated in the portal and also used
as a way to show the usefulness of the ontology. The knowledge based
system will be filled with data of Indonesian medicinal plants. By
showing the usefulness of the developed ontology in a semantic web
application, we motivate all stakeholders to participate in the
development of knowledge based system of medicinal plants in
Indonesia.
Abstract: Existing methods of data mining cannot be applied on
spatial data because they require spatial specificity consideration, as
spatial relationships.
This paper focuses on the classification with decision trees, which
are one of the data mining techniques. We propose an extension of
the C4.5 algorithm for spatial data, based on two different approaches
Join materialization and Querying on the fly the different tables.
Similar works have been done on these two main approaches, the
first - Join materialization - favors the processing time in spite of
memory space, whereas the second - Querying on the fly different
tables- promotes memory space despite of the processing time.
The modified C4.5 algorithm requires three entries tables: a target
table, a neighbor table, and a spatial index join that contains the
possible spatial relationship among the objects in the target table and
those in the neighbor table. Thus, the proposed algorithms are applied
to a spatial data pattern in the accidentology domain.
A comparative study of our approach with other works of
classification by spatial decision trees will be detailed.
Abstract: In the cloud computing hierarchy IaaS is the lowest
layer, all other layers are built over it. Thus it is the most important
layer of cloud and requisite more importance. Along with advantages
IaaS faces some serious security related issue. Mainly Security
focuses on Integrity, confidentiality and availability. Cloud
computing facilitate to share the resources inside as well as outside of
the cloud. On the other hand, cloud still not in the state to provide
surety to 100% data security. Cloud provider must ensure that end
user/client get a Quality of Service. In this report we describe
possible aspects of cloud related security.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: Nowadays, the Web has become one of the most
pervasive platforms for information change and retrieval. It collects
the suitable and perfectly fitting information from websites that one
requires. Data mining is the form of extracting data’s available in the
internet. Web mining is one of the elements of data mining
Technique, which relates to various research communities such as
information recovery, folder managing system and simulated
intellects. In this Paper we have discussed the concepts of Web
mining. We contain generally focused on one of the categories of
Web mining, specifically the Web Content Mining and its various
farm duties. The mining tools are imperative to scanning the many
images, text, and HTML documents and then, the result is used by
the various search engines. We conclude by presenting a comparative
table of these tools based on some pertinent criteria.
Abstract: The operation of nuclear power plants involves
continuous monitoring of the environment in their area. This
monitoring is performed using a complex data acquisition system,
which collects status information about the system itself and values
of many important physical variables e.g. temperature, humidity,
dose rate etc. This paper describes a proposal and optimization of
communication that takes place in teledosimetric system between the
central control server responsible for the data processing and storing
and the decentralized measuring stations, which are measuring the
physical variables. Analyzes of ongoing communication were
performed and consequently the optimization of the system
architecture and communication was done.
Abstract: Software reusability is an essential characteristic of
Component-Based Software (CBS). The component reusability is an
important assess for the effective reuse of components in CBS. The
attributes of reusability proposed by various researchers are studied
and four of them are identified as potential factors affecting
reusability. This paper proposes metric for reusability estimation of
black-box software component along with metrics for Interface
Complexity, Understandability, Customizability and Reliability. An
experiment is performed for estimation of reusability through a case
study on a sample web application using a real world component.
Abstract: Assertion-Based software testing has been shown to
be a promising tool for generating test cases that reveal program
faults. Because the number of assertions may be very large for
industry-size programs, one of the main concerns to the applicability
of assertion-based testing is the amount of search time required to
explore a large number of assertions. This paper presents a new
approach for assertions exploration during the process of Assertion-
Based software testing. Our initial exterminations with the proposed
approach show that the performance of Assertion-Based testing may
be improved, therefore, making this approach more efficient when
applied on programs with large number of assertions.
Abstract: In this paper, we propose a new packing strategy to
find a free resource for run-time mapping of application tasks to
NoC-based Heterogeneous MPSoC. The proposed strategy minimizes
the task mapping time in addition to placing the communicating tasks
close to each other. To evaluate our approach, a comparative study is
carried out for a platform containing single task supported PEs.
Experiments show that our strategy provides better results when
compared to latest dynamic mapping strategies reported in the
literature.
Abstract: Through this paper we present a method for automatic
generation of ontological model from any data source using Model
Driven Architecture (MDA), this generation is dedicated to the
cooperation of the knowledge engineering and software engineering.
Indeed, reverse engineering of a data source generates a software
model (schema of data) that will undergo transformations to generate
the ontological model. This method uses the meta-models to validate
software and ontological models.