19 research outputs found

    Dynamic Reciprocal Authentication Protocol for Mobile Cloud Computing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.A combination of mobile and cloud computing delivers many advantages such as mobility, resources, and accessibility through seamless data transmission via the Internet anywhere at any time. However, data transmission through vulnerable channels poses security threats such as man-in-the-middle, playback, impersonation, and asynchronization attacks. To address these threats, we define an explicit security model that can precisely measure the practical capabilities of an adversary. A systematic methodology consisting of 16 evaluation criteria is used for comparative evaluation, thereby leading other approaches to be evaluated through a common scale. Finally, we propose a dynamic reciprocal authentication protocol to secure data transmission in mobile cloud computing (MCC). In particular, our proposed protocol develops a secure reciprocal authentication method, which is free of Diffie–Hellman limitations, and has immunity against basic or sophisticated known attacks. The protocol utilizes multifactor authentication of usernames, passwords, and a one-time password (OTP). The OTP is automatically generated and regularly updated for every connection. The proposed protocol is implemented and tested using Java to demonstrate its efficiency in authenticating communications and securing data transmitted in the MCC environment. Results of the evaluation process indicate that compared with the existing works, the proposed protocol possesses obvious capabilities in security and in communication and computation costs

    An Efficient Solution to Travelling Salesman Problem using Genetic Algorithm with Modified Crossover Operator

    Get PDF
    The traveling salesman problem (TSP) is a famous NP-hard problem in the area of combinatorial optimization. It is utilized to locate the shortest possible route that visits every city precisely once and comes back to the beginning point from a given set of cities and distance. This paper proposes an efficient and effective solution for solving such a query. A modified crossover method using Minimal Weight Variable, Order Selection Crossover operator, a modified mutation using local optimization and a modified selection method using KMST is proposed. The crossover operator (MWVOSX) chooses a particular order from multiple orders which have the minimum cost and takes the remaining from the other parent in backward and forward order. Then it creates two new offspring. Further, it selects the least weight new offspring from those two offspring. The efficiency of the proposed algorithm is compared to the classical genetic algorithm. Comparisons show that our proposed algorithm provides much efficient results than the existing classical genetic algorithm

    An overview of effect of activation functions on training and performance of artificial neural network modelling

    Get PDF
    This paper presents an overview of the effect of the activation functions on the training and performance of artificial neural network modelling. An artificial neural network's activation functions are mathematical formulas that are essential to its design. Activation functions are a critical component of artificial neural networks since they impact the performance of the ANN model to a considerable extent. It is a function that is utilized in order to obtain the output of the node. In an artificial neural network, defining an activation function is critical, as it directly affects the network's success rate. A concise summary of some of the most frequent activation functions that are utilized in neural networks. Activation functions are defined, their properties are compared, and their advantages and disadvantages are described in this paper. This review is provided with the definitions, features, performance comparisons, merits and demerits and applications of activation function in various areas. The activation function has an impact on the development of ANN models. It is found that sigmoid, Tanh and ReLU are the most used activation function and give better performance compared to others

    IoT enable relay network for demand based light intensity controlled seamless highway lighting system

    Get PDF
    Highway authority spends huge amount of money per year for Highway Lighting System worldwide (e.g., Malaysia USD 25 Million per year). Internet of Things (IoT) becomes one of the popular concepts that provides prominent solutions in various paradigms. Exploiting IoT, this work develops a prototype for efficient highway lighting system at lower energy consumption. Two key features need to be taken into account for designing such a system are: i) Road users’ point of view (i.e., Comfort and safety) ii) Road service providers’ point of view (i.e., Reduce Energy Consumption and Maintenance Cost). The characteristics of this prototype revile the effectiveness of the proposal

    The characterisation of diarrhoeagenic verotoxin producing non-o157 coli among young children in Kuantan, Malaysia

    Get PDF
    Background: Diarrhoeagenic verotoxin producing non-O157 Escherichia coli (VTEC) are associated with endemic infantile diarrhoea-causing morbidity and mortality worldwide. VTEC can also cause severe illness and has an impact on outbreaks, especially in developing countries. This study aims to investigate the prevalence and characterisation of VTEC and their association in causing infectious diarrhoea among Malaysian children. Methods: Standard microbiological techniques identified a total of 137 non-repeated, clinically significant E. coli isolates. Serological assays discerned non-O157 E. coli serogroup, subjected to virulence screen (VT1 and VT2) by a polymerase chain reaction (PCR). Results: Different PCR sets characterised the 49 clinical isolates of sorbitol positive non-O157 E. coli. Twenty-nine isolates harboured verotoxin genes associated with diarrhoea among children (≤ 5 years old). Among the 29 (59.18%) strains of verotoxin producing E. coli* genotypes VT1 and VT2 were detected in 21 (42.85%) and 5 (10.20%) isolates respectively, while both VT1 and VT2 genes were confirmed in 3 (6.12%) isolates. Conclusion: This study evaluates on the prevalence, serological characteristics and antimicrobial susceptibility patterns of VTEC diarrhoea affected children (≤ 5 years old). Besides, the prevalence of verotoxin gene was determined as a root cause of diarrhoea among Malaysian children

    Modeling lung functionality in volume-controlled ventilation for critical care patients

    Get PDF
    Mechanical ventilators are the instruments that assist breathing of the patients having respiratory diseases e.g., pneumonia and coronavirus disease 2019 (COVID-19). This paper presents a modified lung model under volume-controlled ventilation to describe the lung volume and air flow in terms of air pressure signal from the ventilator. A negative feedback is incorporated in the model to balance the lung volume that is influenced by a lung parameter called positive end expiration pressure. We partially solved the lung model equation which takes the form of a first-order differential equation and then unknown parameters associated with the model were computed using a nonlinear least-squares method. Experimental data required for parameter identification and validation of the lung model were obtained by running a volume-controlled ventilator connected to a reference device and an artificial lung. The proposed model considering negative feedback achieves a better accuracy than that without feedback as demonstrated by test results. The developed model can be used in intensive care units (ICU) to evaluate mechanical ventilation performance and lung functionality in real-time

    Authentication technologies for cloud technology, IoT, and big data

    No full text
    This book covers the state-of-art global research on authentication technologies for security and privacy in information systems, including applications, research challenges and future research directions

    MODELING AND SIMULATION OF TRAFFIC FLOW: A CASE STUDY - FIRST RING ROAD IN DOWNTOWN MADINAH

    Get PDF
    Traffic assessment is extremely important for the performance evaluation of vehicle-flow on a road network. This paper presents an assessment of traffic flow on the busiest road i.e., First Ring Road located at the central area of Madinah in Saudi Arabia. In this paper, the assessment of traffic-flow is performed by evaluating and analyzing the traffic on First Ring Road. This includes investigating the number of vehicles entering and exiting the central area through First Ring Road, the arrangements of the road, percentage of traffic entering versus exiting, etc. In addition, a new model for the traffic distribution along the roads intersecting with First Ring Road was built based on optimization. Our optimization model was formulated as a minimization problem of the difference between the measured number of vehicles and the sum of portions of vehicles from all entrances of First Ring Road that move out from each road. A simulation program was developed using Matlab to solve the optimization model. The simulation results show good agreement with the corresponding measurement data of vehicles at First Ring Road. Thus, our model can be used as a prediction model of vehicle movements
    corecore