Thursday, July 30, 2020

A WEB-BASED SOLUTION FOR POWER QUALITY DATA MANAGEMENT

Author :  Claudiu Popirlan

Affiliation :  Computer Science Department & INCESA Research Hub for Applied Sciences University of Craiova

Country :  Romania

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

In this paper we present a web-based solution designed to convert (integrating an appropriate plugin) heterogeneous information provided by any type of power acquisition equipment into standard formats as PQDIF (Power Quality Data Interchange Format - IEEE® Std 1159.3- 2003 standard). The power grid operators are interested for this kind of applications capable to convert huge volume of heterogeneous information into standard formats in order to be easily processed.

Keyword :  Web-Based Solution, Java Enterprise Application, Power Quality, Data Conversion

For More Details https://airccj.org/CSCP/vol8/csit88907.pdf

Wednesday, July 29, 2020

A COMPARISON OF REAL-TIME TASK SCHEDULING METHODS IN SPACECRAFT SIMULATION

Author :  Mehmet Emin Güllüoğlu

Affiliation :  Baskent University

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

Today, embedded real-time applications play an important role in modern life. Satellites are also robust embedded real-time applications. A satellite project can cost over three-hundred million dollars. As many satellite manufacturers validate their satellites before launching, satellite simulators play the most valuable role in validation infrastructures. Specifically, satellite flight software validation has become more important. In this paper, we focused on the round robin (RR), rate monotonic (RM), and event driven (ED) real-time scheduling task methods with respect to their CPU usage performance for satellite simulator infrastructures. The tasks are evaluated and tested by real-time executive for multiprocessor systems (RTEMS). Those scheduling tasks are used in polling mode in the simulation setup. In this study, we compared three task scheduler methods for attitude orbit control system tasks and MIL-STD 1553 bus data distribution controller tasks in a spacecraft simulator environment. The results were close and the values were not segregated, thus, we chose RR and ED, because RR was easy to implement and ED allowed for full control of the tasks.

Keyword :  Real-time embedded systems, Real-time operating system, Rate monotonic task, Round robin task, Event driven task handling, and Satellite simulations


For More Details https://airccj.org/CSCP/vol8/csit88906.pdf




Tuesday, July 28, 2020

A STUDY ON THE MANAGEMENT OF SEGREGATED BIOMETRIC DATA

Author :  YougJae Kim

Affiliation :  Korea Polytechnic University

Country :  Korea

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

This proposal of paper is the first international standard and research management technology of biometric data. By introducing and applying this international standards, everyone can acknowledge and approve are process for management of segregated biometric information. First, Safety requirement of segregated biometric information. Second, Growth and development of segregated biometric information. Third, Convenience promotion of financial transactions. The demand for biometric authentication service is on a trend of significant increase owing to the advances in new technology such as the Internet of Things (IoT), artificial intelligence and others as well as the expanded use of fin-tech and electronic financing arrangements. Biometric information is convenient because it is inherent and does not need to be remembered or stored, but leakage or misuse of the information could bring about serious problems because of its unique property. It is becoming more and more important to manage the information safely without the possibility of misuse or leakage. To store the information safely, it is effective to segregate the information into fragments in an un-usable form. Accordingly, we propose to standardize the international standard for Management of Segregated Biometric Information. The purpose of paper is to propose to standardize the international standard of the distributed management technology of biometric data such as ISO, IEC, ITU and UNCEFACT

Keyword :  biometric information, registration process, authentication process, financial transactions, fintech, e-Banking

For More Details https://airccj.org/CSCP/vol8/csit88905.pdf

Monday, July 27, 2020

TBFV-M: TESTING-BASED FORMAL VERIFICATION FOR SYSML ACTIVITY DIAGRAMS

Author :  Yufei Yin

Affiliation :  Hosei University

Country :  Japan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

SysML activity diagrams are often used as models for software systems and its correctness is likely to significantly affect the reliability of the implementation. However, how to effectively verify the correctness of SysML diagrams still remains a challenge. In this paper, we propose a testing-based formal verification (TBFV) approach to the verification of SysML diagrams, called TBFV-M, by creatively applying the existing TBFV approach for code verification. We describe the principle of TBFV-M and present a case study to demonstrate its feasibility and usability. Finally, we conclude the paper and point out future research directions.

Keyword :  SysML activity diagrams, TBFV, test path generation, formal verification of SysML diagram

For More Detailshttps://airccj.org/CSCP/vol8/csit88904.pdf

Sunday, July 26, 2020

AUTOMATED VISUALIZATION OF INPUT/ OUTPUT FOR PROCESSES IN SOFL FORMAL SPECIFICATIONS

Author :  Yu Chen

Affiliation :  Graduate School of Computer and Information Sciences, Hosei University

Country :  Japan

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

While formal specification is regarded as an effective means to capture accurate requirements and design, validation of the specifications remains a challenge. Specification animation has been proposed to tackle the challenge, but lacking an effective representation of the input/output data in the animation can considerably limit the understanding of the animation by clients. In this paper, we put forward a tool supported technique for visualization of the input/output data of processes in SOFL formal specifications. After discussing the motives of our work, we describe how data of each kind of data type available in the SOFL language can be visualized to facilitate the representation and understanding of input/output data. We also present a supporting tool for the technique and a case study to demonstrate the usability and effectiveness of our proposed technique. Finally, we conclude the paper and point out the future research directions.

Keyword :  Visualization, SOFL, Formal specification, Data type, Formal methods

For More Details https://airccj.org/CSCP/vol8/csit88903.pdf

Friday, July 24, 2020

PERFORMANCE ANALYSIS OF SEVERAL SCHEDULING ALGORITHMS IN NAKAGAMI-M FADING CHANNELS Author : Hakkı Soy Affiliation : Department of Electrical and Electronics Engineering, Necmettin Erbakan University Country : Turkey Category : Computer Science & Information Technology Volume, Issue, Month, Year : 8, 9, June, 2018 Keyword : Spectral Efficiency, Fairness, Scheduling, Opportunistic Beamforming, Nakagami-m Fading Journal/ Proceedings Name : Computer Science & Information Technology URL : https://airccj.org/CSCP/vol8/csit88902.pdf

Author :  Hakkı Soy

Affiliation :  Department of Electrical and Electronics Engineering, Necmettin Erbakan University

Country :  Turkey

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

This study investigates the performances of several scheduling algorithms (Round Robin, maximum SNR and opportunistic Round Robin) in the Medium Access Control (MAC) layer of wireless network with cellular architecture. The spectral efficiency and fairness are two important metrics to evaluate the performance of wireless systems. The Nakagami-m distribution is a generalized way to model the small scale fading and it can characterize the various wireless fading channel conditions by changing the value of m parameter. The channel is assumed to have a Nakagami-m slow fading model and the opportunistic beamforming scheme is used to enlarge the rate / dynamic range of channel fluctuations through the employment of multiple antennas at the base station. The MATLAB based Monte Carlo simulations are implemented to show the effects of the antenna number and m parameter of the Nakagami distribution. The obtained results proved that the pure opportunistic max-SNR algorithm has a spectral efficiency advantage over the others, even though it has a bad fairness characteristic in high number of users. The main contribution of this study is showing that the effects of the Nakagami-m fading parameter and opportunistic beamforming on the performance of the well-known scheduling algorithms.

Keyword :  Spectral Efficiency, Fairness, Scheduling, Opportunistic Beamforming, Nakagami-m Fading

For More Details https://airccj.org/CSCP/vol8/csit88902.pdf

Call For Papers - 7th International Conference on Advanced Computing (ADCO 2020)



7th International Conference on Advanced Computing (ADCO 2020)

https://www.cseij.org/adco/index.html

Important Dates :
Submission Deadline:July 25, 2020
Authors Notification:August 10, 2020
Registration & Camera-Ready Paper Due:August 13, 2020
Contact Us: adco@cseij.org


Thursday, July 23, 2020

HOLMES : HOLISTIC MICE-ELEPHANTS STOCHASTIC SCHEDULING IN DATA CENTER NETWORKS

Author :  Tingqiu Tim Yuan

Affiliation :  Huawei Technologies

Country :  Huawei

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 9, June, 2018

Abstract :

Dependability of Scheduling between latency-sensitive small data flows (a.k.a. mice) and throughputoriented large ones (a.k.a. elephants) has become ever challenging with the proliferation of cloud based applications. In light of this mounting problem, this work proposes a novel flow control scheme, HOLMES (HOListic Mice-Elephants Stochastic), which offers a holistic view of global congestion awareness as well as a stochastic scheduler of mixed mice-elephants data flows in Data Center Networks (DCNs). Firstly, we theoretically prove the necessity for partitioning DCN paths into sub-networks using a stochastic model. Secondly, the HOLMES architecture is proposed, which adaptively partitions the available DCN paths into low-latency and high-throughput sub-networks via a global congestion-aware scheduling mechanism. Based on the stochastic power-of-two-choices policy, the HOLMES scheduling mechanism acquires only a subset of the global congestion information, while achieves close to optimal load balance on each end-to-end DCN path. We also formally prove the stability of HOLMES flow scheduling algorithm. Thirdly, extensive simulation validates the effectiveness and dependability of HOLMES with select DCN topologies. The proposal has been in test in an industry production environment.

Keyword :  Center Network,bandwidth for minutes,multi-tenant mode

For More Detailshttps://airccj.org/CSCP/vol8/csit88901.pdf

Wednesday, July 22, 2020

AUTOMATED USABILITY EVALUATION OF E-LEARNING WEBSITES IN SAUDI ARABIA

Author :  Khalid Al-Omar

Affiliation :  Department of Information Systems, King Abdulaziz University

Country :  Kingdom of Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, June, 2017

Abstract :

Web usability is a significant factor in increasing user satisfaction, performance, trust, and loyalty. Web usability is particularly important for people who mostly depend on the website and for one reason or other cannot visit an institution, such as online distance education students. Accordingly, universities and educational websites need to determine the types of usability problems they have on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific usability problems that could be found on e-learning websites in general, and specifically, in the Kingdom of Saudi Arabia (KSA). The aim of this paper is to study and analyse the usability of university websites that offer distance education courses in the KSA. A total of 12 universities in Saudi Arabia were considered, which include 11 affiliated and one private university. The analysis of the data represents the level of usability of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable, but violate basic usability guidelines

Keyword :  University Websites, Credibility, Trustworthiness, Online Trust, Website Design, Saudi Arabia, Distance Education

For More Details https://airccj.org/CSCP/vol7/csit77001.pdf

Tuesday, July 21, 2020

ANALYSIS OF LAND SURFACE DEFORMATION GRADIENT BY DINSAR

Author :  Karima Hadj-Rabah

Affiliation :  Department of Telecommunications,University of Sciences and Technology Houari Boumediene (USTHB)

Country :  Algeria

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

The progressive development of Synthetic Aperture Radar (SAR) systems diversify the exploitation of the generated images by these systems in different applications of geoscience.Detection and monitoring surface deformations, procreated by various phenomena had benefited from this evolution and had been realized by interferometry (InSAR) and differential interferometry (DInSAR) techniques. Nevertheless, spatial and temporal decorrelations of the interferometric couples used, limit strongly the precision of analysis results by these techniques. In this context, we propose, in this work, a methodological approach of surface deformation detection and analysis by differential interferograms to show the limits of this technique according to noise quality and level. The detectability model is generated from the deformation signatures, by simulating a linear fault merged to the images couples of ERS1 / ERS2 sensors acquired in a region of the Algerian south.

Keyword :  Radar Interferometry (InSAR & DInSAR), Surface Deformation Gradient (SDG), Coherence, Resolution, Filtering

For More Detailshttps://airccj.org/CSCP/vol8/csit88810.pdf

Monday, July 20, 2020

4D AUTOMATIC LIP-READING FOR SPEAKER'S FACE IDENTIFCATION

Author :  Adil AbdUlhur AboShana

Affiliation :  University of eötvös loránd, Budapest

Country :  Hungary

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

A novel based a trajectory-guided, concatenating approach for synthesizing high-quality image real sample renders video is proposed . The lips reading automated is seeking for modeled the closest real image sample sequence preserve in the library under the data video to the HMM predicted trajectory. The object trajectory is modeled obtained by projecting the face patterns into an KDA feature space is estimated. The approach for speaker's face identification by using synthesise the identity surface of a subject face from a small sample of patterns which sparsely each the view sphere. An KDA algorithm use to the Lip-reading image is discrimination, after that work consisted of in the low dimensional for the fundamental lip features vector is reduced by using the 2D-DCT.The mouth of the set area dimensionality is ordered by a normally reduction base on the PCA to obtain the Eigen lips approach, their proposed approach by[33]. The subjective performance results of the cost function under the automatic lips reading modeled , which wasn’t illustrate the superior performance of the method.

Keyword :  Lip Segmentation, Discrete cosine transform algorithm, kernel Discriminant Analysis , Discrete Hartley Transform, hidden Markov Model.

For More Detailshttps://airccj.org/CSCP/vol8/csit88809.pdf

Wednesday, July 15, 2020

REDCLAN - RELATIVE DENSITY BASED CLUSTERING AND ANOMALY DETECTION

Author :  Diptarka Saha

Affiliation :  WalmartLabs, Bengaluru, Karnataka

Country :  India

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 13, September, 2018

Abstract :

Cluster analysis and Anomaly Detection are the primary methods for database mining. However, most of the data in today's world, generated from multifarious sources, don’t adhere to the assumption of single or even known distribution - hence the problem of finding clusters in the data becomes arduous as clusters are of widely differing sizes, densities and shapes, along with the presence of noise and outliers. Thus, we propose a relative-KNN-kernel density-based clustering algorithm. The un-clustered (noise) points are further classified as anomaly or nonanomaly using a weighted rank-based anomaly detection method. This method works particularly well when the clusters are of varying variability and shape, in these cases our algorithm not only finds the “dense” clusters that other clustering algorithms find, it also finds low-density clusters that these approaches fail to identify. This more accurate clustering in turn helps reduce the noise points and makes the anomaly detection more accurate.

Keyword :  Clustering, Relative KNN – kernel density, Varying density clusters, Anomaly Detection, DBSCAN

For More Details https://airccj.org/CSCP/vol8/csit89303.pdf

SOFTWARE ENGINEERING IN GLOBALLY DISTRIBUTED TEAMS

Author :  Manasés Jesús Galindo Bello

Affiliation :  Department of Applied Computer Science, Hochschule Fulda

Country :  Germany

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 13, September, 2018

Abstract :

Software engineering principles are brought into practice by Information Technology companies all around the world. Software can be developed by local teams which members have different cultural backgrounds, as well as by teams distributed across countries. To save costs and be close to markets and customers, companies offshore or outsource the personnel. Although developing software in distributed teams offers multiple benefits, there are also stiff challenges that engineers and managers have to deal with, e.g. communication and collaboration may get affected because of geographic distance, different time zones and distinct cultural backgrounds among team members. If not addressed on time and effectively, these challenges generate misunderstanding and conflict among the team which eventually may impact the projects deadlines and quality of the software. This paper presents the most common software engineering practices, challenges and tools in global teams, as well as practical cases in the industrial and academic realms.

Keyword :  Collaboration, Management, Culture, Conflict, Challenges

For More Detailshttps://airccj.org/CSCP/vol8/csit89301.pdf

Monday, July 13, 2020

A SURVEY ON QUESTION ANSWERING SYSTEMS: THE ADVANCES OF FUZZY LOGIC

Author :  Eman Mohamed Nabil Alkholy

Affiliation :  Faculty of Computers & Information, Helwan University

Country :  Egypt

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

In real world computing environment with using a computer to answer questions has been a human dream since the beginning of the digital era, Question-answering systems are referred to as intelligent systems, that can be used to provide responses for the questions being asked by the user based on certain facts or rules stored in the knowledge base it can generate answers of questions asked in natural , and the first main idea of fuzzy logic was to working on the problem of computer understanding of natural language, so this survey paper provides an overview on what Question-Answering is and its system architecture and the possible relationship and different with fuzzy logic, as well as the previous related research with respect to approaches that were followed. At the end, the survey provides an analytical discussion of the proposed QA models, along or combined with fuzzy logic and their main contributions and limitations.

Keyword :  Question-answering, Neutral language processing, Fuzzy Logic, Answer Extraction, Evaluation Metrics

For More Details :  https://airccj.org/CSCP/vol8/csit88806.pdf

Sunday, July 12, 2020

INTELLIGENT ELECTRONIC ASSESSMENT FOR SUBJECTIVE EXAMS

Author :  Alla Defallah Alrehily

Affiliation :  Faculty of computing and information technology, King Abdulaziz University

Country :  Saudi Arabia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Keyword :  Subjective Assessments, E-Examination, WordNet, semantic similarity.

Abstract :

In education, the use of electronic (E) examination systems is not a novel idea, as Eexamination systems have been used to conduct objective assessments for the last few years.This research deals with randomly designed E-examinations and proposes an E-assessment system that can be used for subjective questions. This system assesses answers to subjective questions by finding a matching ratio for the keywords in instructor and student answers. The matching ratio is achieved based on semantic and document similarity. The assessment system is composed of four modules: preprocessing, keyword expansion, matching, and grading. A survey and case study were used in the research design to validate the proposed system. The examination assessment system will help instructors to save time, costs, and resources, while increasing efficiency and improving the productivity of exam setting and assessments.

For More Details https://airccj.org/CSCP/vol8/csit88804.pdf

Thursday, July 9, 2020

TWO DISCRETE BINARY VERSIONS OF AFRICAN BUFFALO OPTIMIZATION METAHEURISTIC

Author :  Amira GHERBOUDJ

Affiliation :  MISC laboratory, NTIC faculty, AbdelhamidMehri University Constantine 2

Country :  Mehri University Constantine 2, A

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

African Buffalo Optimization (ABO) is one of the most recent swarms intelligence based metaheuristics. ABO algorithm is inspired by the buffalo’s behavior and lifestyle. Unfortunately,the standard ABO algorithm is proposed only for continuous optimization problems. In this paper, the authors propose two discrete binary ABO algorithms to deal with binary optimization problems. In the first version (called SBABO) they use the sigmoid function and probability model to generate binary solutions. In the second version (called LBABO) they use some logical operator to operate the binary solutions. Computational results on two knapsack problems (KP and MKP) instances show the effectiveness of the proposed algorithm and their ability to achieve good and promising solutions.

Keyword :  Optimization, metaheuristic, swarm intelligence, binary problems, African Buffalo Optimization, knapsack problems

For More Detailshttps://airccj.org/CSCP/vol8/csit88803.pdf

DETECTION OF ALGORITHMICALLY GENERATED MALICIOUS DOMAIN

Author :  Enoch Agyepong

Affiliation :  Cyber Operations Team, Airbus, Corsham

Country :  UK

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

In recent years, many malware writers have relied on Dynamic Domain Name Services (DDNS) to maintain their Command and Control (C&C) network infrastructure to ensure a persistence presence on a compromised host. Amongst the various DDNS techniques, Domain Generation Algorithm (DGA) is often perceived as the most difficult to detect using traditional methods. This paper presents an approach for detecting DGA using frequency analysis of the character distribution and the weighted scores of the domain names. The approach’s feasibility is demonstrated using a range of legitimate domains and a number of malicious algorithmicallygenerated domain names. Findings from this study show that domain names made up of English characters “a-z” achieving a weighted score of < 45 are often associated with DGA. When a weighted score of < 45 is applied to the Alexa one million list of domain names, only 15% of the domain names were treated as non-human generated.

Keyword :  Domain Generated Algorithm, malicious domain names, Domain Name Frequency Analysis & malicious DNS

For More Details :  https://airccj.org/CSCP/vol8/csit88802.pdf

Monday, July 6, 2020

GLOBAL MUSIC ASSET ASSURANCE DIGITAL CURRENCY: A DRM SOLUTION FOR STREAMING CONTENT USING BLOCKCHAIN

Author :  Ahmed Gomaa

Affiliation :  Department of Operations and Information Management, University of Scranton

Country :  USA

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  8, 8, May, 2018

Abstract :

The amount of piracy in the streaming digital content in general and the music industry in specific is posing a real challenge to digital content owners. This paper presents a DRM solution to monetizing, tracking and controlling online streaming content cross platforms for IP enabled devices. The paper benefits from the current advances in Blockchain and cryptocurrencies. Specifically, the paper presents a Global Music Asset Assurance (GoMAA) digital currency and presents the iMediaStreams Blockchain to enable the secure dissemination and tracking of the streamed content. The proposed solution provides the data owner the ability to control the flow of information even after it has been released by creating a secure, selfinstalled, cross platform reader located on the digital content file header. The proposed system provides the content owners’ options to manage their digital information (audio, video, speech, etc.), including the tracking of the most consumed segments, once it is release. The system benefits from token distribution between the content owner (Music Bands), the content distributer (Online Radio Stations) and the content consumer(Fans) on the system blockchain.

Keyword :  Blockchain, Cryptocurrency, Digital Rights Management, Public Key, Private Key

For More Details :  https://airccj.org/CSCP/vol8/csit88801.pdf

Sunday, July 5, 2020

AN ENERGY EFFICIENT HIERARCHICAL ROUTING SCHEME FOR WIRELESS SENSOR NETWORKS

Author :  Alaa Aadri

Affiliation :  University of Sultan Moulay Slimane, Faculty of Sciences and Techniques Information Processing Decision Support Laboratory

Country :  Morocco

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, July, 2017

Abstract :

Wireless sensor networks represent a very interesting field in the Internet of objects (IoT) and in information and communication technologies in view of the diversity of their applications based on the manipulation of information through sensor nodes with limited characteristics (low storage capacity, autonomous source of energy, limited power, etc.). In this kind of networks generally called WSN, hierarchical routing has shown over the last few years his increasing interest among researchers in the field of computer research aiming to guarantee energy efficiency of the network. In this paper, we compare some existing energy efficient clustering routing protocol with a new clustering protocol which we have developed during our researches using different simulation parameters, and we show that our routing protocol gives better results and extends the network lifetime.

Keyword :  IoT; WSN; hierarchical routing; energy efficiency; performance analyzis

For More Details :  https://airccj.org/CSCP/vol7/csit77011.pdf

Friday, July 3, 2020

AN ENERGY EFFICIENT HIERARCHICAL ROUTING SCHEME FOR WIRELESS SENSOR NETWORKS

Author :  Alaa Aadri

Affiliation :  University of Sultan Moulay Slimane, Faculty of Sciences and Techniques Information Processing Decision Support Laboratory

Country :  Morocco

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, July, 2017

Keyword :  IoT; WSN; hierarchical routing; energy efficiency; performance analyzis

Abstract :

Wireless sensor networks represent a very interesting field in the Internet of objects (IoT) and in information and communication technologies in view of the diversity of their applications based on the manipulation of information through sensor nodes with limited characteristics (low storage capacity, autonomous source of energy, limited power, etc.). In this kind of networks generally called WSN, hierarchical routing has shown over the last few years his increasing interest among researchers in the field of computer research aiming to guarantee energy efficiency of the network. In this paper, we compare some existing energy efficient clustering routing protocol with a new clustering protocol which we have developed during our researches using different simulation parameters, and we show that our routing protocol gives better results and extends the network lifetime.

For More Details :  https://airccj.org/CSCP/vol7/csit77011.pdf

Thursday, July 2, 2020

SECURING INFORMATION SYSTEMS A NEW APPROACH

Author :  William R. Simpson

Affiliation :  Institute for Defense Analyses, 4850 Mark Center Dr., Alexandria

Country :  Virginia

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, July, 2017

Abstract :

Increasing threat intrusions to enterprise computing systems have led to a formulation of guarded enterprise systems. The approach was to put in place steel gates and prevent hostile entities from entering the enterprise domain. The current complexity level has made the fortress approach to security implemented throughout the defence, banking, and other high trust industries unworkable. The alternative security approach presented in this paper is the result of a concentrated fourteen year program of pilots and research. Its distributed approach has no need for passwords or accounts and derives from a set of tenets that form the basic security model requirements. At each step in the process it determines identities and claims for access and privileges. These techniques are resilient, secure, extensible, and scalable. They are currently being implemented for a major enterprise, and are a candidate for other enterprise security approaches. This paper discusses the Enterprise Level Security architecture, a webbased security architecture designed to select and incorporate technology into a cohesive set of policies and rules for an enterprise information system. The paper discusses the history, theoretical underpinnings, implementation decisions, current status, and future plans for expansion of capabilities and scale.
                           
Keyword :  Access control, attributes, authentication, claims, cryptography, digital signatures, enterprise, high assurance, identity management systems, public key infrastructure

For More Detailshttps://airccj.org/CSCP/vol7/csit77009.pdf

Wednesday, July 1, 2020

DYNAMIC OUTPUT FEEDBACK CONTROL FOR SAMPLED-DATA SYSTEM WITH ACTUATOR SATURATION USING QUANTIZED MEASUREMENTS

Author :  Liuwen Li

Affiliation :  School of Automation, Southeast University

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  7, 8, July, 2017

Abstract :

This paper is focused on the dynamic output feedback control of sampled-data system with actuator saturation using quantized measurements. The output signals are quantized before they are transmitted to dynamic output-feedback controller. An augmented system is constructed through a closed-loop system, which is a model with an interval time-varying delay and nonlinear items. Using discontinuous Lyapunov function and linear matrix inequality approach, the criterion of asymptotical stability is obtained; furthermore, on the basis of the above stability condition, we design a dynamic output-feedback controller. Lastly, the effective of the proposed method is proved by a numerical example.

Keyword :  Discontinuous Lyapunov function, Dynamic output-feedback control, Sampled-data control systems, Saturations, quantization.

For More Details :  https://airccj.org/CSCP/vol7/csit77008.pdf