182 research outputs found

    Random ambience using high fidelity images

    Get PDF
    Most of the secure communication nowadays mandates true random keys as an input. These operations are mostly designed and taken care of by the developers of the cryptosystem. Due to the nature of confidential crypto development today, pseudorandom keys are typically designed and still preferred by the developers of the cryptosystem. However, these pseudorandom keys are predictable, periodic and repeatable, hence they carry minimal entropy. True random keys are believed to be generated only via hardware random number generators. Careful statistical analysis is still required to have any confidence the process and apparatus generates numbers that are sufficiently random to suit the cryptographic use. In this underlying research, each moment in life is considered unique in itself. The random key is unique for the given moment generated by the user whenever he or she needs the random keys in practical secure communication. An ambience of high fidelity digital image shall be tested for its randomness according to the NIST Statistical Test Suite. Recommendation on generating a simple 4 megabits per second random cryptographic keys live shall be reported

    Building of the Enabled Web-Based GIS Participation System: A Tool to Enhance Community Participation in City Development Plan

    Get PDF
    This research has been conducted under the frame work of GIS interoperability infrastructure financed by the Malaysian Ministry of Science and Technology. In this paper, we discuss the development and analyze the potential application of the Geographical Information System (GIS) and Internet computing to enhance community participation in the decision making processes i.e. in Local Plan of Block 3, Melaka Tengah district as a model. The focus of this paper is on the designing and development of the enabled Web-based GIS Participation System called, GISPSS. It is considered to be similar to a Real Time Resources Discovery Server but it comprises four main complimentary components: the Map Viewer, the Objection Support, the Planning Process Documentation, and the Web Content Management. The functional features of these components are highlighted. The multi-tiered architecture forms the basis of the Enabled Webbased GIS system has been adopted in this research

    Mitigation of packet loss with end-to-end delay in wireless body area network applications

    Get PDF
    The wireless body area network (WBAN) has been proposed to offer a solution to the problem of population ageing, shortage in medical facilities and different chronic diseases. The development of this technology has been further fueled by the demand for real-time application for monitoring these cases in networks. The integrity of communication is constrained by the loss of packets during communication affecting the reliability of WBAN. Mitigating the loss of packets and ensuring the performance of the network is a challenging task that has sparked numerous studies over the years. The WBAN technology as a problem of reducing network lifetime; thus, in this paper, we utilize cooperative routing protocol (CRP) to improve package delivery via end-to-end latency and increase the length of the network lifetime. The end-to-end latency was used as a metric to determine the significance of CRP in WBAN routing protocols. The CRP increased the rate of transmission of packets to the sink and mitigate packet loss. The proposed solution has shown that the end-to-end delay in the WBAN is considerably reduced by applying the cooperative routing protocol. The CRP technique attained a delivery ratio of 0.8176 compared to 0.8118 when transmitting packets in WBAN

    Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

    Get PDF
    Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6)emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future

    Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks

    Get PDF
    This paper investigates and describes a new provisioning technique for IEEE 802.11 based networks, focusing on the ad-hoc Distributed Coordination Function (DCF) to redefine stability of the network throughput to support QoS. This paper propose better techniques to achieve stable throughput in Wireless LAN networks by assigning new values to the Contention Window to high priority traffics which will guarantee better throughput to the selected network traffic. A simulation is done using Network Simulator 2 (NS-2) and findings are then presented. Results showed that stable throughput can be achieved to provide better traffic flows especially for real-time traffic and multimedia applications

    Behavioral analysis on IPV4 Malware in both IPV4 and IPv6 Network Environment

    Get PDF
    Malware is become an epidemic in computer net-work nowadays. Malware attacks are a significant threat to networks. A conducted survey shows malware attacks may result a huge financial impact. This scenario has become worse when users are migrating to a new environment which is Internet Protocol Version 6. In this paper, a real Nimda worm was released on to further understand the worm beha-vior in real network traffic. A controlled environment of both IPv4 and IPv6 network were deployed as a testbed for this study. The result between these two scenarios will be analyzed and discussed further in term of the worm behavior. The ex-periment result shows that even IPv4 malware still can infect the IPv6 network environment without any modification. New detection techniques need to be proposed to remedy this prob-lem swiftl

    Transfer of Global Measures of Dependence into Cumulative Local

    Get PDF
    We explore an idea of transferring some classic measures of global dependence between random variables X1,X2,…,Xn into cumulative measures of dependence relative at any point (X1,X2,…,Xn) in the sample space. It allows studying the behavior of these measures throughout the sample space, and better understanding and use of dependence. Some examples on popular copula distributions are also provided

    Improving IEEE 802.11 to Support Quality of Service in Wireless Networks

    Get PDF
    This paper investigates and describes the Quality of Services (QoS) provisioning techniques for IEEE 802.11 based networks, focusing on the Distributed Coordination Function (DCF). This paper propose better techniques to provide QoS by assigning new parameters to the DCF access method, involving the DCF Interframe Space (DIFS), backoff time and the maximum data packet size to high priority nodes, which will distinguish the high priority traffic from the low priority traffic to support QoS. A simulation is done using Network Simulator 2 (NS-2) and the expected output is then presented

    Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks

    Get PDF
    This paper paper investigates, describes and propose better techniques to provide QoS by assigning new metrics to the DCF access method, involving the DCF Interframe Space (DIFS), Contention Window values and the maximum data packet size to high priority nodes, which will bias towards high priority multimedia traffic to support QoS. A simulation is done using Network Simulator 2 (NS-2) and comparisons were made between different sets of network simulation scenarios. Improvements on throughput, delay and jitter can clearly be seen and further analysis is then presented

    Endoscopic image analysis using Deep Convolutional GAN and traditional data

    Get PDF
    One big challenge encountered in the medical field is the availability of only limited annotated datasets for research. On the other hand, medical image annotation requires a lot of input from medical experts. It is noticed that machine learning and deep learning are producing better results in the area of image classification. However, these techniques require large training datasets, which is the major concern for medical image processing. Another issue is the unbalanced nature of the different classes of data, leading to the under-representation of some classes. Data augmentation has emerged as a good technique to deal with these challenges. In this work, we have applied traditional data augmentation and Generative Adversarial Network (GAN) on endoscopic esophagus images to increase the number of images for the training datasets. Eventually we have applied two deep learning models namely ResNet50 and VGG16 to extract and represent the relevant cancer features. The results show that the accuracy of the model increases with data augmentation and GAN. In fact, GAN has achieved the highest accuracy, that is, 94% over non-augmented training set and traditional data augmentation for VGG16
    • …
    corecore