34 research outputs found

    Seamless model interoperability for software design and analysis

    Get PDF
    Software development has now become a critical process that handles a plethora of sensitive and mission critical information that involves lives, money and time. As such, designing such a critical piece of software has become even more critical and requires a solid logical or mathematical analysis behind it to ensure the reliability of the software. Modelling is one of the preferred methods for software designers to express their design, especially through easy to use modeling languages such as UML (Unified Modelling Language). However the lack of formal analysis capabilities in UML makes it necessary for a redundant formal model to be created as well, in order to analyze the design. Model interoperability as referred to in this paper promotes the use of UML, to be paired seamlessly with a formal model that is capable in performing formal mathematical analysis on the software design

    QSroute: A QoS aware routing scheme for Software Defined Networking

    Get PDF
    The increasing demand for bandwidth-intensive network applications, such as video streaming, multimedia, and Internet of Things (IoT) applications, necessitates improved resource management to protect the network without compromising Quality of Service (QoS). Meeting these challenges requires a centralized view of all available network resources. Software Defined Networking (SDN), an emerging technology, provides a centralized view and control of network resources. This feature enables administrators to programmatically define and manage network behavior, including routing, making it more flexible and adaptable. This study proposes a QoS-aware routing scheme for SDN that considers available bandwidth, packet delay, and packet loss to determine the optimal routing path. Optimal paths are selected based on meeting predefined threshold criteria. The study concludes by discussing potential directions for future research in this field

    Blockchain-enabled cybersecurity provision for scalable heterogeneous network: A comprehensive survey

    Get PDF
    Blockchain-enabled cybersecurity system to ensure and strengthen decentralized digital transaction is gradually gaining popularity in the digital era for various areas like finance, transportation, healthcare, education, and supply chain management. Blockchain interactions in the heterogeneous network have fascinated more attention due to the authentication of their digital application exchanges. However, the exponential development of storage space capabilities across the blockchain-based heterogeneous network has become an important issue in preventing blockchain distribution and the extension of blockchain nodes. There is the biggest challenge of data integrity and scalability, including significant computing complexity and inapplicable latency on regional network diversity, operating system diversity, bandwidth diversity, node diversity, etc., for decision-making of data transactions across blockchain-based heterogeneous networks. Data security and privacy have also become the main concerns across the heterogeneous network to build smart IoT ecosystems. To address these issues, today’s researchers have explored the potential solutions of the capability of heterogeneous network devices to perform data transactions where the system stimulates their integration reliably and securely with blockchain. The key goal of this paper is to conduct a state-of-the-art and comprehensive survey on cybersecurity enhancement using blockchain in the heterogeneous network. This paper proposes a full-fledged taxonomy to identify the main obstacles, research gaps, future research directions, effective solutions, and most relevant blockchain-enabled cybersecurity systems. In addition, Blockchain based heterogeneous network framework with cybersecurity is proposed in this paper to meet the goal of maintaining optimal performance data transactions among organizations. Overall, this paper provides an in-depth description based on the critical analysis to overcome the existing work gaps for future research where it presents a potential cybersecurity design with key requirements of blockchain across a heterogeneous network

    HSO: A hybrid swarm optimization algorithm for reducing energy consumption in the cloudlets

    Get PDF
    Mobile Cloud Computing (MCC) is an emerging technology for the improvement of mobile service quality. MCC resources are dynamically allocated to the users who pay for the resources based on their needs. The drawback of this process is that it is prone to failure and demands a high energy input. Resource providers mainly focus on resource performance and utilization with more consideration on the constraints of service level agreement (SLA). Resource performance can be achieved through virtualization techniques which facilitates the sharing of resource providers’ information between different virtual machines. To address these issues, this study sets forth a novel algorithm (HSO) that optimized energy efficiency resource management in the cloud; the process of the proposed method involves the use of the developed cost and runtime-effective model to create a minimum energy configuration of the cloud compute nodes while guaranteeing the maintenance of all minimum performances. The cost functions will cover energy, performance and reliability concerns. With the proposed model, the performance of the Hybrid swarm algorithm was significantly increased, as observed by optimizing the number of tasks through simulation, (power consumption was reduced by 42%). The simulation studies also showed a reduction in the number of required calculations by about 20% by the inclusion of the presented algorithms compared to the traditional static approach. There was also a decrease in the node loss which allowed the optimization algorithm to achieve a minimal overhead on cloud compute resources while still saving energy significantly. Conclusively, an energy-aware optimization model which describes the required system constraints was presented in this study, and a further proposal for techniques to determine the best overall solution was also made

    Developing a prototype e-commerce application with credit card validation and secure transaction

    Get PDF
    Shopping today has been a problem for many people since more people nowadays have less time to shop. Therefore many are actually switching to e-commerce applications. Anyhow,the problem with e-commerce application is that many of them are not secure.This application is designed to enhance the e-commerce applications with additional security items.The security enhancement made was integrating an encryption module that secures the data that are stored in the databases. The application also includes an online credit card validation module that validates credit cards against the Luhn Algorithm and predefined credit card prefixes.The application will accept three types of credit cards which are Mastercard,Visa and American Express.The application is developed on the NET platform using ASP.NET and Visual Basic NET scripting.Therefore,the application could run on all kinds of platform.The application requires a Microsoft Server based operating system and Microsoft SQL Server in order for it to run.The application has been tested and runs successfully both on a server and on a workstation with server settings.In short,this system is the solution to the problems of current e-commerce technology

    Main frame in our midst

    Get PDF
    There is a certain mis conception on everyone’s mind about mainframe: it’s obsolete. However, this could not be further that the truth. Mainframe of today plays a central role in the daily operation of the world’s largest companies including many of the Fortune 1000 companies. In fact even in Malaysia, the majority of banks and central government agencies use mainframes in their daily operations. As such, the mainframes are not obsolete – they are just hidden from the public eyes

    The Potential of a Classification-based Algorithm to Calculate Calories in Real-Time Via Pattern Recognition

    Get PDF
    Calories refer to a unit of energy that people should consume based on total energy needed. Thus, a system for health monitoring applications that can measure calories and nutrition can be very useful. This research is mainly focused on creating a new algorithm based on classification technique to calculate food calorie intake in real-time. Enhancement on Extreme Learning Machine (ELM) algorithm will be done to get better results in terms of accuracy and speed of calculating the food calorie. The ELM algorithm will be applied to an ultra-mobile Near Infrared (NIR) spectrometer. While the algorithm helped to classify different types of wavelengths produced from the sensor, a classification-based algorithm via Pattern Recognition Method will be used to classify and match the food components. The results will displayed the total amount of calories consumed per day, per week and per month with total amount of calories left in a mobile application

    A Model Driven Analysis of the 802.11 CSMA/CA Protocol through SD2PN

    Get PDF
    Unified Modelling Language (UML) has been conferred as the de facto standard in modeling by majority in the software system development community. Among the various types of diagrams that exist under the umbrella of UML is Sequence Diagram. Sequence Diagrams are capable of modeling interactional behaviours as well as dynamic happenings in a system, and as such are generally used in the modeling of complex software systems. However in this paper, Sequence Diagrams are used in the modeling of the IEEE 802.11 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) protocol. The Sequence Diagram representing this protocol will then be used for formal, mathematical analysis by first transforming the Sequence Diagram through the MDA model transformation tool called SD2PN, and performing analysis such as liveness analysis, boundedness analysis and reachability analysis of the resulting Petri Net

    A Survey of UML Tools

    Get PDF
    Unified Modeling Language (UML) is a modeling language widely used in the field of software engineering. It is a standard to visualize the design of a system structurally and behaviorally. UML tools are software tools used to create UML diagrams, perform model and diagram interchange, model transformation, code generation, reverse engineering and round-trip engineering, There are many free UML tools available to be downloaded in the internet. This paper serves as a survey for ten UML tools and gives recommendation to users on which UML tools to be used in different situations. The result of the survey is tabulated so that users are easily able to compare the ten UML tools based on the criteria set by the author

    Intuitive Content Management System

    Get PDF
    Content Management System (CMS) is a system that is used to control or manage content on a website such as text, links, image, HTML documents and other form of media. The aim of CMS is to help non-technical users to design their website. Resources hungriness is a critical problem in most of the CMS. A lot of development and software maintenance fees has been charged towards the society. Traditional CMS is not the best choice for the users who want to develop an easy and simple website because it is very heavy loaded and will indirectly decrease the website performance. The objective of this research is to develop an Intuitive Content Management System (ICMS) for non-technical users by using data-driven technology for creating a standard and user-friendly website easily. Users just need to choose the contents from a templates, upload images and fill up the necessary documents in order to create a quick, easy and dynamic website
    corecore