10 research outputs found

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS

    Get PDF
    Vehicular Ad hoc Network (VANET) is a communication network for vehicles on the road. The concept of VANET is to create communication between vehicles, such as one vehicle is able to inform another vehicle about the road conditions. Communication is possible by vehicle to vehicle (V2V) and vehicle to road side unit (V2R). Presently, VANET technology is surrounded with security challenges and it is essentially important for VANET to successfully implement a security measure according to the safety applications requirements. Many researchers have proposed a number of solutions to counter security attacks and also to improve certain aspects of security i.e. authentication, privacy, and non-repudiation. The current most suitable security scheme for VANET is an Elliptic Curve Digital Signature Algorithm (ECDSA) asymmetric security mechanism. ECDSA is small in key size but it provides the same level of security as the large key sized scheme. However ECDSA is associated with high computational cost, thus lacking applicability in life-critical safety messaging. Due to that reason, alternative security schemes have been proposed, such as symmetric methods which provide faster communication, but at the expense of reduced security. Hence, hybrid and hardware based solutions have been proposed by researchers to mitigate the issue. However, these solutions still do not satisfy the existing safety applications standard or have larger message size due to increased message drop ratio. In this thesis, a security framework is presented; one that uses both standard asymmetric PKI and symmetric cryptography for faster and secured safety message exchange. The proposed framework is expected to improve the security mechanism in VANET by developing trust relationship among the neighboring nodes, hence forming trusted groups. The trust is established via Trusted Platform Module (TPM) and group communication. In this study, the proposed framework methods are simulated using two propagation models, i.e. two ray ground model and Nakagami model for VANET environment (802.11p). In this simulation, two traffic scenarios such as highway and urban are established. The outcome of both simulation scenarios is analyzed to identify the performance of the proposed methods in terms of latency (End-to-End Delay and Processing Delay). Also, the proposed V2V protocol for a framework is validated using a software in order to establish trust among vehicles

    VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS

    Get PDF
    by A Thesis Submitted to the Postgraduate Studies Programme as a Requirement for the Degree of MASTER OF SCIENCE BANDAR SERI ISKANDAR, PERAK, MALAYSIA FEBRUARY 201

    Students' Class Performance Prediction Using Machine Learning Classifiers

    Get PDF
    Nowadays, educational data mining is being employed as assessing tool for study and analysis of hidden patterns in academic databases which can be used to predict student's academic performance. This paper implements various machine learning classification techniques on students' academic records for results predication. For this purpose, data of MS(CS) students were collected from a public university of Pakistan through their assignments, quizzes, and sessional marks. The WEKA data mining tool has been used for performing all experiments namely, data pre-processing, classification, and visualization. For performance measure, classifier models were trained with 3- and 10-fold cross validation methods to evaluate classifiers' accuracy. The results show that bagging classifier combined with support vector machines outperform other classifiers in terms of accuracy, precision, recall, and F-measure score. The obtained outcomes confirm that our research provides significant contribution in prediction of students' academic performance which can ultimately be used to assists faculty members to focus low grades students in improving their academic records

    Economic Implications of Tomato Production in Naushahro Feroze District of Sindh Pakistan

    Get PDF
    In the present study, attempt was made to explore the economic implication of tomato in Nausharo Feroze Sindh. For this purpose 60 growers were selected from different villages of District Naushero feroz of Sindh province during the year 2013 using survey method of study.  The data on various costs, physical and revenue productivity were collected from 60 randomly selected tomato farmers. Result revealed that the education level of selected growers was in order of 25.00% primary (5years), 36.66% of middle (8years), 16.66% matriculate (10years) 3.33% educated from college and university, 1.70% graduate the 18.33% of tomato respondents were illiterate. Results further indicate that farmers incurred an average per hectare fixed costs. Rs 33187.00 include Rs 700.00 for land tax, Rs 32487.00 for rent of land. The results revealed that tomato farmers incurred an average per hectare cost of Rs 19780.75 as labor cost. An average per acre marketing cost of 30457.65 on tomato capital input used, and an average per acre marketing cost was Rs. 4191.73 On an average per acre spent a total cost of production of Rs. 87617.13. An average per acre Physical productivity was 186.00 in mounds. An average per acre Revenue productivity was Rs.158750.00 and the Net income was 71133.00 an availed input output ratio 1:1.81 it means that with the investment of Rs.1.00 in tomato enterprises they yielded Rs.1.81. The cost benefit ratio of the cultivation of tomato at 1:0.81 it means that the tomato growers fetched Rs.0.81 on each rupee investment of tomato. The poor production implies that the soil quality, inadequate canal water, insect pest and poor extension services could be the causes this low production. The empirical result indicates that significant increase in input of tomato in the study area could be traced mainly to use of latest technology. Keywords: Tomato, cost, fruit yield, labor, net returns, and cost-benefit ratio

    EFFICIENT, SCALABLE, AND MULTI-PATH NETWORK MOBILITY MANAGEMENT SCHEMES FOR MOBILE NETWORKS

    No full text
    The Network Mobility Basic Support Protocol (NEMO-BSP) is an extended version of Mobile Internet Protocol (MIPv6) designed to support seamless communications between homogenous and heterogeneous network domains. NEMOBSP is a basic mobility solution that lacks good QoS, specifically in terms of packet delivery cost and end-to-end delay

    StegoCrypto as Multi-Security Protocol to Ensure the Security Instance Messaging in the Sindhi Language

    Get PDF
    Instance messaging services are an important source of communication among modern technology users. This kind of messaging service is also facing lots of security issues such as message breaching, confidentiality, integrity, availability, and interruption in communication. Few questions such as do existing security tools provide comfort to people? Or do existing security tools provide very basic protection that we believe that everybody needs? These questions need to answer in more detail and accurately. Due to the rapid development in technology, the way of communication is changed where the Internet provides the best way of communication among millions of people in the entire world. Nowadays users prefer to communicate in their local languages. Therefore the chances of communication breaches increase dramatically in local languages because negligible security-based work is done in many local languages. The majority of security-based work has been done in the English language but still, lots of work needs to be done on other languages including the Sindhi Language. In this paper, a new security model titled StegoCrypto is proposed to make more secure communication in the Sindhi language. The proposed StegoCrypto model is a hybrid of steganography and cryptography. It has been observed in the results that the proposed StegoCrypto model has succeeded in hiding the secret information in the text during communication between two users in the Sindhi language. To the best of our knowledge, this is the first kind of research done on the Sindhi languag

    What You Should Know About Next Generation 6G Mobile Technology

    No full text
    The fifth generation (5G) mobile communication technology though, is being deployed in various parts of the world to improve the wireless systems in terms of infrastructure and quality of services, in view of mobile communication history, the 5G may be unable to handle the deluge mobile network traffic of the future digital society. In general, new wireless technologies are introduced every 10 years, and services mature every 20 years, and therefore sixth generation (6G) mobile communication technologies, which have a great potential to impact on the market, are expected to be commercialized around 2030. In order to secure technological leadership in mobile communication, which is an essential infrastructure for everyday life and industrial sites, advanced countries around the world have begun to develop 6G technology. The expected main features of the 6G technology include: providing 10 to 100 times more performance than 5G, maximizing performance by utilizing the terahertz band which was not utilized by existing communication networks before, use artificial intelligence techniques for smart networking, and combining the previously isolated technologies. This paper provides an overview on the profile, advancements, implications, architecture, expected applications, and challenges of the futuristic 6G wireless communication systems described by innovative researchers and major global organizations

    Effect of various levels of date palm kernel on growth performance of broilers

    No full text
    Aim: The aim of this study was the assessment of various levels of date palm kernel (DPK) on the growth performance of broilers. Materials and Methods: A 250-day-old broiler chicks were randomly selected and categorized into five groups (50 chicks/group) contained A (control), B, C, D and E fed with 0%, 1%, 2%, 3% and 4% levels of DPK in balanced ration, respectively, for 6 weeks. Feed and water intake were recorded daily in the morning and evening. The data for feed intake, water intake, live body weight, and feed conversion ratio (FCR) were recorded from all birds regularly. The carcass weight and percentage obtained via six slaughtered birds were randomly selected from each group. Finally, economic aspects of the rations evaluated. Results: The most feed intakes of broilers were recorded in Group A (3915.1 g) that was significantly higher than Groups D and E. The highest water intake was in Group E (9067.78 ml) that was significantly higher than Group A and control group. Live body weight was highest in Group E (979.85 g) than Groups B, C, and control group. The best growth weights were determined significantly in Groups D (1921.96 g) and E (1935.95 g). The lowest FCRs were indicated significantly in Groups D (1.97 g/g) and E (1.92 g/g) than Groups B and A. The highest carcass weights were recorded in Groups D (1214.01 g) and E (1230.88 g) that were significantly more than other groups. Dressing percentages in Groups D (61.76%) and E (62.17%) were higher than other groups (p<0.05). The net profits (Rs.) in Groups A, B, C, D and E were indicated 27.01, 32.77, 36.78, 43.47 and 44.51 per broiler, respectively. Conclusion: It was concluded that the high levels of DPK (3-4%) significantly decreased broiler feed intake and increased water intake, live body weight, growth weight, carcass weight, dressing percentage, net profit per bird and also had positive effects on growth of broilers

    Towards Enabling Multihop Wireless Local Area Networks for Disaster Communications

    No full text
    xCalamities such as earthquakes and tsunami affect communication services by devastating the communication network and electrical infrastructure. Multihop relay networks can be deployed to restore the communication environment quickly in catastrophe-stricken areas. However, performance in terms of throughput is affected by deploying the relay networks. In wireless local area networks (WLANs), the primary purpose of multiband transmission employing multihop relay networks is to increase the throughput and reduce the latency. In the future, wireless networks are believed to carry high throughput, more data rates, and less latency by expanding bandwidth-demanding applications. Simultaneous multiband transmission in WLAN systems is considered to increase the coverage area without power escalation. Due to the inherent characteristics of different bands and channel conditions, transmission rates tend to be different. The impact of such conditions may cater to the disproportional distribution of data among bands, causing some of the bands to be overwhelmed, which incurs buffer overflow and packet loss. In contrast, the channel capacity of some of the bands remains underutilized. In this paper, we consider the channel conditions and transmission rates of each band on either side of the relay to address the problems mentioned above. Furthermore, this paper proposes a load distribution-based end-to-end traffic scheduling technique to improve system performance. The simulation results demonstrate the effectiveness of our proposed method with maximizing throughput and minimizing end-to-end delay

    Proceedings of the 1st Liaquat University of Medical & Health Sciences (LUMHS) International Medical Research Conference

    No full text
    corecore