28 research outputs found

    Software Clustering using Hybrid Multi-Objective Black Hole Algorithm

    Get PDF
    Abstract-Software clustering is the process of organizing software units into appropriate clusters so as to efficiently modularize complex program structure. In this paper, we investigate the use of hybrids of Black Hole algorithm (developed using weighted aggregation, auxiliary archive and Genetic Algorithm) to optimize multiple objectives for clustering of android mobile applications. It is empirically and statistically observed that multi-objective Black Hole algorithm when improved using Genetic Algorithm and auxiliary archive outperforms Two-Archive algorithm and its counterparts. Keywords-bio-inspired algorithm, edgesim, nature-inspired algorithm, serach based software engineering, software clsuterin

    Cryptanalysis and Performance Evaluation of Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers

    Get PDF
    In these days there are plenty of signature schemes such as the threshold proxy signature scheme (Kumar and Verma 2010). The network is a shared medium so that the weakness security attacks such as eavesdropping, replay attack, and modification attack. Thus, we have to establish a common key for encrypting/decrypting our communications over an insecure network. In this scheme, a threshold proxy signature scheme based on RSA, any or more proxy signers can cooperatively generate a proxy signature while or fewer of them cannot do it. The threshold proxy signature scheme uses the RSA cryptosystem to generate the private and the public key of the signers (Rivest et al., 1978). Comparison is done on the basis of time complexity, space complexity, and communication overhead. We compare the performance of four schemes (Hwang et al. (2003), Kuo and Chen (2005), Yong-Jun et al. (2007), and Li et al. (2007), with the performance of a scheme that has been proposed earlier by the authors of this paper. In the proposed scheme, both the combiner and the secret share holder can verify the correctness of the information that they are receiving from each other. Therefore, the enhanced threshold proxy signature scheme is secure and efficient against notorious conspiracy attacks

    A STUDY OF FACE RECOGNITION ACROSS AGE INVARIANT USING GRAPH METHOD

    No full text
    one of the challenges in automatic face recognition is to achieve temporal invariance. The goal is come up with a representation and matching scheme i.e robust to changes due to facial aging. Facial aging is a complex process that affects both the 3D shape of the face and its texture. we proposed a graph based face representation for age invariant face recognition the graph contains information on the appearance and geometry of fluid feature points and an age model learned for each individual and graph space is built using the set of feature descriptors extracted from each face image

    A New System for the Development of Collision Free in VANET 1

    No full text
    Abstract In VANET, or Intelligent Vehicular Ad-Hoc Networking, defines an intelligent way of using Vehicular Networking. InVANET integrates on multiple ad-hoc networking technologies such as WiFi IEEE 802.11, WAVE IEEE 1609, WiMAX IEEE 802.16, and Bluetooth for easy, accurate, effective and simple communication between vehicles on dynamic mobility. Effective measures such as media communication between vehicles can be enabled as well methods to track the automotive vehicles are also preferred. InVANET helps in defining safety measures in vehicles, streaming communication between vehicles, infotainment and telematics. The type of InVANET applications and inherent characteristics such as different network energy level and movement of vehicles from one network to other network makes this task (prior information about traffic) quite challenging. In this paper we focus on Inter Vehicle Communication (IVC) and Roadside to Vehicle Communication (RVC) network, one algorithm has been developed and proposed for implementation in real life IVC and RVC application. This paper's contribution is a reliable broadcasting method that is especially designed for an optimum performance of public-safety related applications
    corecore