622 research outputs found

    Bandwidth Allocation Mechanism based on Users' Web Usage Patterns for Campus Networks

    Get PDF
    Managing the bandwidth in campus networks becomes a challenge in recent years. The limited bandwidth resource and continuous growth of users make the IT managers think on the strategies concerning bandwidth allocation. This paper introduces a mechanism for allocating bandwidth based on the users’ web usage patterns. The main purpose is to set a higher bandwidth to the users who are inclined to browsing educational websites compared to those who are not. In attaining this proposed technique, some stages need to be done. These are the preprocessing of the weblogs, class labeling of the dataset, computation of the feature subspaces, training for the development of the ANN for LDA/GSVD algorithm, visualization, and bandwidth allocation. The proposed method was applied to real weblogs from university’s proxy servers. The results indicate that the proposed method is useful in classifying those users who used the internet in an educational way and those who are not. Thus, the developed ANN for LDA/GSVD algorithm outperformed the existing algorithm up to 50% which indicates that this approach is efficient. Further, based on the results, few users browsed educational contents. Through this mechanism, users will be encouraged to use the internet for educational purposes. Moreover, IT managers can make better plans to optimize the distribution of bandwidth

    QR Code Integrity Verification Based on Modified SHA-1 Algorithm

    Get PDF
    The modified SHA-1 algorithm was applied in the data integrity verification process of certificates with QR code technology. This paper identified the requirements needed in the certificate verification that uses the modified SHA-1. The application was tested using legitimate and fraudulent certificates. Based on the results, the application successfully generated QR codes, printed certificates, and verified certificates with 100% accuracy. During the trial run of the app, four test cases were seen which involves correct names and QR codes, and three other possible test cases of faking certificates such as modification of the name, regeneration of QR codes using valid hash and a fake name, and modification of the QR code. Although these cases exist, the app successfully verified all thirty certificates correctly. Also, it is noticed that during the scanning, the smartphone camera should be in focus to capture the QR code clearly

    Implementation of Modified AES as Image Encryption Scheme

    Get PDF
    Since images have bigger size than text, a faster encryption algorithm is needed to provide higher security in digital images. The paper presents a modified AES algorithm that address the requirement in image encryption. The modified algorithm used bit permutation in replacement of MixColumns to reduce the computational requirement of the algorithm in encrypting images. Results of the study show that the modified algorithm exhibited faster encryption and decryption time in images. The modified algorithm also achieved a good result in the key sensitivity analysis, histogram analysis, information entropy, the correlation coefficient of adjacent pixels, Number of Pixel Change Rate and Unified Average Change Intensity making the modified algorithm resistant to statistical and differential attack

    Developing a secured image file management system using modified AES

    Get PDF
    Images are a means to share and convey relevant data in today’s digital world. This paper presents an image file management system to provide a platform for distributing and viewing images in a secured manner. The shared image files are stored in the server in an encrypted manner to provide additional security to the owner of the file. A modified AES algorithm using bit permutation was used to encrypt the image files. Based on the experimental result, image files were successfully encrypted in the server and can only be decrypted by the intended recipient of the file providing an efficient and reliable way of exchanging images

    An Improved Overlapping Clustering Algorithm to Detect Outlier

    Get PDF
    MCOKE algorithm in identifying data objects to multi cluster is known for its simplicity and effectiveness. Its drawback is the use of maxdist as a global threshold in assigning objects to one or more cluster while it is sensitive to outliers. Having outliers in the datasets can significantly affect the effectiveness of maxdist as regards to overlapping clustering. In this paper, the outlier detection is incorporated in MCOKE algorithm so that it can detect and remove outliers that can participate in the calculation of assigning objects to one or more clusters. The improved MCOKE algorithm provides better identification of overlapping clustering results. The performance was evaluated via F1 score performance criterion. Evaluation results revealed that the outlier detection demonstrated higher accuracy rate in identifying abnormal data (outliers) when applied to real datasets

    Exploring the roles of Australian communication practitioners in organizational value setting: agents of conscience, control, and/or compliance?

    Get PDF
    This study examined whether Australian public relations and communication practitioners enact an organizational conscience role through their involvement in the organizational value-setting process. Thirty communication practitioners from 26 large organizations in Melbourne and Sydney were interviewed between May 2004 and May 2005 to ascertain and discuss their involvement in organizational value setting. Using semi-structured in-depth interviews to gather data and then applying a multiple perspective approach in its thematic data analysis, the research found that most respondents were involved in organizational value setting albeit at different stages of the process. In analysing the nature of the respondent’s involvement in the process along with individual and organizational factors, three roles emerged namely, the agent of critical conscience, the agent of concertive control, and the agent of corporate compliance. However the results suggest that most respondents enacted primarily the concertive control and corporate compliance agency roles. The study also found that the predominant managerial/functionalist perspective constrains practitioners from enacting the conscience leadership role. In exploring the practitioners’ ability to influence organizational members, findings support recent studies that membership in the dominant coalition does not necessarily give public relations/communication practitioners power and influence. Rather, direct access to the CEO, expertise, performance and personality were found to be the key ingredients to the individual communication practitioners’ organizational influence. Findings also reveal that public relations/communication practitioners preferred to participate but not drive the organizational value-setting process. In using a multiple perspective approach to study public relations roles, this study provides empirical basis for identifying potential leadership roles for public relations/communication practitioners and for suggesting an extension of the manager-technician role typology. The study calls for public relations/communication practitioners to enact a critical conscience agent role as part of finding a meaningful, ethical and socially responsible practice. This study proposes that critical thought and dialectical inquiry be embedded within the public relations/communication practitioner’s role and public relations education

    A New Approach in Expanding the Hash Size of MD5

    Get PDF
    The enhanced MD5 algorithm has been developed by expanding its hash value up to 1280 bits from the original size of 128 bit using XOR and AND operators. Findings revealed that the hash value of the modified algorithm was not cracked or hacked during the experiment and testing using powerful bruteforce, dictionary, cracking tools and rainbow table such as CrackingStation, Hash Cracker, Cain and Abel and Rainbow Crack which are available online thus improved its security level compared to the original MD5. Furthermore, the proposed method could output a hash value with 1280 bits with only 10.9 ms additional execution time from MD5. Keywords: MD5 algorithm, hashing, client-server communication, modified MD5, hacking, bruteforce, rainbow table
    • …
    corecore