24 research outputs found

    Defining a Software Engineering Process with Cost-effective Security Requirements Implementation

    Get PDF
    Today, security problems involving computers and software are frequent, widespread, and serious. The number and variety of attacks by persons and malicious software from outside organizations, particularly via the Internet, are increasing rapidly, and the amount and consequences of insider attacks remains serious. Security is not just a question of security functionality; the properties desired must be shown to hold wherever required throughout the secure system. Because security properties are systems properties, security is an omnipresent issue throughout the software lifecycle. This paper describes the existing software development lifecycle with the integration of security engineering process. After that, we will adopt the Information System Environment in the case of the University of Information Technology (UIT). Moreover, this paper describes an Information Security Software Engineering (ISSE) process for discovering and addressing users’ information protection needs based on the case study of UIT’s information System Environment. Finally, the proposed system performs the quantitative risk analysis on the study of UIT Information System Environment

    Implementing Distributed Data Management System In Dynamic Objects By Using Improved Sort Based Algorithm

    Get PDF
    In the High Level Architecture (HLA) paradigm, the Runtime Infrastructure (RTI) provides a set of services, such as data distribution and management (DDM) among federates. Each federate may inform the RTI about its intention to publish some data or it may subscri be to receive a subset of the published data. DDM services are used to reduce the transmission and receiving of irrelevant data and aimed at reducing the communication over the network. These services rely on the computation of the intersection between “up date” and “subscription” regions. Currently, there are several main DDM filtering algorithms. Our proposed system describes data management and filtering mechanism on tank simulation in battlefield area. This system intends to detect the movement of the ta nk ob ject s, search overlap between the tank object and every regional regiment (extent). When overlapping information is getting from one of the simulation object (OverlapDetector), another simulation object (Coordinator) connects the relevant extent that conta ining the tank object. That extent continued to send the tank information to other regional regiments according to the predefined list. In this paper, we present the design and implementation of a simulation platform used to implement one of the fil tering algorithms, the improved sort based algorithm, and report the overhead of reducing network traffic and ensuring that the forwarding data receive federates only who need the data

    Data Compression Strategy for Reference-Free Sequencing FASTQ Data

    Get PDF
    Today, Next Generation Sequencing (NGS) technologies play a vital role for many research fields such as medicine, microbiology and agriculture, etc. The huge amount of these genomic sequencing data produced is growing exponentially. These data storages, processing and transmission becomes the most important challenges. Data compression seems to be a suitable solution to overcome these challenges. This paper proposes a lossless data compression strategy to process reference-free raw sequencing data in FASTQ format. The proposed system splits the input file into block files and creates a dynamic dictionary for reads. Afterwards, the transformed read sequences and dictionary are compressed by using appropriate lossless compression method. The performance of the proposed system was compared with existing state-of-art compression algorithms for three sample data sets. The proposed system provides up to 3% compression ratio of other compression algorithms

    A Ciphertext Policy Attributes-based Encryption Scheme with Policy Revocation

    Get PDF
    There are a lot of data exchanges among the parties by using cloud computing. So data protection is very important in cloud security environment. Especially, data protection is needed for all organization by security services against unauthorized accesses. There are many security mechanisms for data protection. Attributes-based Encryption (ABE) is a one-to-many encryption to encrypt and decrypt data based on user attributes in which the secret key of a user and the ciphertext are dependent upon attributes. Ciphertext policy attributes-based encryption (CP-ABE), an improvement of ABE schemes performs an access control of security mechanisms for cloud storage. In this paper, sensitive parts of personal health records (PHRs) are encrypted by ABE with the help of CP-ABE. Moreover, an attributes-based policy revocation case is considered as well as user revocation and it needs to generate a new secret key. In proposed policy revocation case, PHRs owner changes attributes policy to update available user lists. A trusted authority (TA) is used to issue secret keys as a third party. This paper emphasizes on key management and it also improves attributes policy management and user revocation. Proposed scheme provides a full control on data owner as much as he changes policy. It supports a flexible policy revocation in CP-ABE and it saves time consuming by comparing with traditional CP-ABE

    A Lightweight Size Estimation Approach for Embedded System using COSMIC Functional Size Measurement

    Get PDF
    Functional Size Measurement (FSM) is an important component of a software project that provides information for estimating the effort required to develop the measured software. Although the embedded software is time-consuming to develop, COSMIC FSM can be estimated to get more accurate function size. The traditional Function Point methods are designed to measure only business application domain and are problematic in the real-time domain. As a result, COSMIC Functional Size Measurement (FSM) method is designed to measure both application domains. The design diagrams such as UML, SysML and the well-defined FSM procedure must use to accurately measure the functional size of embedded system. We have already developed the generation model based on SysML metamodel with an example of elevator control system. In this paper, we applied the generation model that is the classification of the instance level of object based on UML metamodel. After that, this paper also showed the mapping rules which mapped between the generation model and COSMIC FSM to estimate the functional size of embedded software with the case study of cooker system. This paper also proposed the light weight generation method of COSMIC FSM by using the generation model

    Statistical Machine Translation between Myanmar Sign Language and Myanmar Written Text

    Get PDF
    This paper contributes the first evaluation of the quality of automatic translation between Myanmar sign language (MSL) and Myanmar written text, in both directions. Our developing MSL-Myanmar parallel corpus was used for translations and the experiments were carried out using three different statistical machine translation (SMT) approaches: phrase-based, hierarchical phrase-based, and the operation sequence model. In addition, three different segmentation schemes were studies, these were syllable segmentation, word segmentation and sign unit based word segmentation. The results show that the highest quality machine translation was attained with syllable segmentations for both MSL and Myanmar written text

    Development of Natural Language Processing based Communication and Educational Assisted Systems for the People with Hearing Disability in Myanmar

    Get PDF
    Information and communication technologies (ICTs) provide people with disabilities to better integrate socially and economically into their communities by supporting access to information and knowledge, learning and teaching situations, personal communication and interaction. Our research purpose is to develop systems that will provide communication and educational assistance to persons with hearing disability using Natural Language Processing (NLP). In this paper, we present corpus building for Myanmar sign language (MSL), Machine Translation (MT) between MSL, Myanmar written text (MWT) and Myanmar SignWriting (MSW) and two Fingerspelling keyboard layouts for Myanmar SignWriting. We believe that the outcome of this research is useful for educational contents and communication between hearing disability and general people

    Implementation of Hypothyroid Diagnosis System using Reduct Generation Algorithm

    No full text
    Thyroid is one of the most commondiseases found in human being, it is not a deadlydisease, but it is chronic disease which can giverise to other diseases. Hypothyroidism is simplynot enough thyroid hormone and hyperthyroidismis too much. Thus, this system implementsHypothyroid Diagnosis system for people usingreduct generation algorithm. In Reduct generationalgorithm, reduct represents the minimal sets offeatures which are necessary to maintain the sameclassification power given by the original andcomplete set of features. It evaluates theimportance of attributes, discovers the patterns ofdata, reduces all redundant objects and attributes,and seeks the minimum subset of attributes.Moreover, we analyze that reduct generationalgorithm produces rule data sets which are lessthan the number of rules of decision table methodin WEKA open software. In addition, accuracyresult of this system is tested 94% covered by rulesets using holdout method

    Analyzing Control Flow for Logic Errors

    No full text
    Analyzing the program conditional control flow the important technique using in program execution. Software errors are often caused mostly due to the complexity of software, programming errors, time pressure and changing requirements. In order to en-sure the quantity and integrity of a software product, need to do intensive quantity assurance. Analyzing involves operation of the program or application under controlled control flow, can easily known what control flow will be done during program execution. Control statements are used to control the flow of execution of the program. This execution order depends on the sup-plied data values and conditional logic. Control flow graph in computer science is a representation, using graph notation, of all parts that might be traversed through a program during its execution. This system describes what are the incorrect control flow logic errors are by comparing defined control flow in pro-gram source code

    Analyzing Stock Market on Small Devices through Web Services

    No full text
    This paper basically deals with theavailability of client programs on mobile devicesthat can invoke the remote execution of datamining task. By implementing mobile WebServices, remote users are allowed to execute datamining tasks from a mobile device and receive theresults of a data analysis task on devices. In datamining task presented in this paper, the stock datafrom different companies are categorized based onlow growth, normal growth and high growth usingK-Means algorithm. In client program, mobileusers can periodically visualize the result clustersgenerated from the mining server either in textualor visual form and can periodically check apreferred company whether the company is in low,normal or high group and then the detailinformation of the company can be seen ascommunications. The objective in this paper is toidentify the stock market from the viewpoint ofinvestors from their personal devices withbenefited services i.e. speed increases and savesmemory. So the investors can efficiently investtheir shares in the appropriate companies basedon low growth, normal growth and high growth
    corecore