

Hybrid of Genetic Algorithm and Continuous Ant Colony Optimization for Optimum Solution |
Pages: 1-6 (6) | [Full Text] PDF (303 KB) |
BAN A.MITRAS and ADEEBA KH.ABOO |
Prof. Dr.Operation Research & Artificial Techniques Department, College of Computer Science and Mathematics, Mosul University, Mosul, Iraq M. Sc. Student, Computer Science Department, College of Computer Science and Mathematics, Mosul University, Mosul, Iraq |
Abstract — This research proposes a hybrid approach by combining genetic algorithm (GA) and Continuous Ant Colony Optimization (CACO) to find optimum solutions, using a continuous ant colony algorithm as a mutation of genetic algorithm; the performance of the hybrid algorithm is illustrated using three test functions. The results show the efficiency and capabilities of the new hybrid algorithm in finding the optimum solutions. |
Index Terms — Genetic algorithm (GA), Continuous Ant Colony Optimization (CACO) |
Management of Confidentiality of Cryptosystems Using Linear Codes- a Bird’s Eye View |
Pages: 7-14 (8) | [Full Text] PDF (499 KB) |
Preetha Mathew K and Dr Mathew Cherian |
Associate Professor, Department of Computer Science and Engineering and Principal, Cochin University College of Engineering Kuttanad, Pulincunnu, Alappuzha, Kerala, India |
Abstract — In this paper, we investigate the management of confidentiality in terms of security notions of McEliece cryptosystem, the first encryption scheme using linear codes, proposed on the basis of the hard problems in coding theory and its variants in the provably secure approach. The original McEliece is only a one way function. Therefore to obtain the higher notions of security, modifications on the original scheme are proposed. Li et al. in IEEE transactions on information theory (1994), proved that the security of McEliece cryptosystem and Niederreiter cryptosystem, the dual of McEliece cryptosystem are equivalent. In this paper we show that it is not true. Dolev et al. in their paper published in STOC (1991), coined the notion of non malleability which formalizes an adversary’s ability to create a different cipher text y1for a plain text x1 from the cipher text y which is an encryption of x. It is seen that the McEliece system is malleable and Niederreiter system is non malleable in view of the security notions existing in the provably secure scenario. |
Index Terms — CCA-2 Security, CPA Security, McEliece Cryptosystem, Syndrome Decoding, Code Indistinguishability. |
Securing Patient Privacy in E-Health Cloud Using Homomorphic Encryption and Access Control |
Pages: 15-21 (7) | [Full Text] PDF (632 KB) |
Aderonke Justina. Ikuomola and Oluremi O. Arowolo |
Department of Mathematical Sciences, Ondo State University of Science and Technology, Ondo State Department of Computer Science,Tai Solarin College of Education, Omu Ijebu |
Abstract — Cloud computing paradigm is one of the popular Health Information Technology infrastructures for facilitating Electronic Health Record (EHR) sharing and EHR integration. Healthcare clouds offer new possibilities, such as easy and ubiquitous access to medical data, and opportunities for new business models. However, they also bear new risks and raise challenges with respect to security and privacy aspects. Ensuring the security and privacy is a major factor in the cloud computing environment. A Secured Cloud based aided medical system is a program designed to aid standard and effective use and access of patient records anytime it is required by medical practitioners. In this paper, a Secured e-Health System called SECHA is proposed. SECHA comprises of five basic component namely; patient, PHR/object, Access Control Module, User/Subject and Cloud. This proposed system ensure the security of electronic health records stored in the cloud using Homomorphic Encryption to secure patients medical records and Bilayer Access Control to gives access right to the records. |
Index Terms — Access Control, Cloud Computing, e-Health, Homomorphic Encryption, Security |
Wormhole Attack in Wireless Sensor Network |
Pages: 22-26 (5) | [Full Text] PDF (254 KB) |
RAJ SHREE and R. A. KHAN |
Department of Information Technology, Babasaheb Bhimrao Ambedkar University, Lucknow |
Abstract — In multi hop wireless systems, such as wireless sensor networks, mobile ad hoc network, security is an important factor. It becomes more critical issue when we transmit important data between nodes. There are a lot of attacks available in wireless sensor network or mobile ad hoc network. In our paper we are going to discuss about a particularly devastating attack, known as the wormhole attack. In wormhole attack, an attacker forms two or more malicious nodes in the network at different locations. These nodes are connected with the help of low latency link. As a result of this way two or more malicious nodes create a higher level virtual tunnel in the network. This virtual tunnel is used for sending the packets between the end points of tunnel. Whenever transmission starts between a source to destination, adversary try to record transmitted packets at one location in the network and tunnels all captured packets to another location. The wormhole attack is possible even if the attacker has not compromised with any hosts and even if all communication provides authenticity and confidentiality. The wormhole attack can form a serious threat in wireless networks, especially against many ad hoc network routing protocols and location-based wireless security systems. In this paper, we analyze the nature of wormhole attack in ad hoc and wireless sensor networks and existing methods of the defending mechanism to detect wormhole attacks without require any specialized hardware. |
Index Terms — Ad hoc Network, Wireless Sensor Network, Wormhole Attack, Defending Mechanism |
Information Processing Theory in Budgetary Participation: Its Antecedent and Consequence |
Pages: 27-33 (7) | [Full Text] PDF (222 KB) |
Dian Indri Purnamasari and Rahmawati |
Pembangunan Nasional University “Veteran” Yogyakarta-Indonesia Sebelas Maret University Solo-Indonesia |
Abstract — This study analyzes the role of the Information Processing Theory (IPT) in the budgetary participation with antecedent variables such as environmental dynamism (ED). Furthermore this study examines the influence of budgetary participation on performance (P) in the company. The IPT is used in this study as a contribution to overcome the gap between dynamic environments, information management, budgetary participation and performance. This research concluded that (1) there is a positive relationship between environmental dynamism and task exceptions, information technology, information systems, and budgetary participation, (2) there is no negative relationship between environmental dynamism and task analyzability, (3) there is no positive relationship between task exceptions and budgetary participation, (4) there is a negative relationship between task analyzability and budgetary participation, (5) there is a positive relationship between information technology, and information systems for budgetary participation, and (6) there is a positive relationship between budgetary participation and performance. |
Index Terms — Process, Information, Participation, Budget, Performance |
A Cloud Computing Architecture with Wireless Sensor Networks for Agricultural Applications |
Pages: 34-38 (5) | [Full Text] PDF (469 KB) |
Mr. Mahesh D. S, Ms. Savitha S, Dr. Dinesh K. Anvekar |
Asst Professor, Dept. of CSE, CMRIT, Bangalore-37, India Professor, Director- Entrepreneurship Development Cell, Dept of CSE, CMRIT, Bangalore-37, India |
Abstract — The emergence of precision agriculture has been promoted by the many developments in the field of wireless sensor actor networks (WSAN). These WSANs provide valuable information for harvesting, work management, growth of crops, and prevention of crop diseases. This paper focuses on introducing cloud computing as a new approach to be used in addition to WSANs to further enhance their application and benefits to the field of agriculture. |
Index Terms — Component, Wireless Sensor Actor Networks, Cloud computing, Percision Agriculture |
Monitoring and Analyzing System Activities Using High Interaction Honeypot |
Pages: 39-45 (7) | [Full Text] PDF (460 KB) |
Dr.Najla B. Al-Dabagh and Mohammed A. Fakhri |
Computer Science Dept. College of Computer Science and Mathematics, Mosul University, Mosul, Iraq |
Abstract — Honeypot is one of protection techniques that have been used recently in the field of networks security, characterized by their effectiveness in detecting new attacks and interaction with the attackers and providing a suitable environment for them to do their attacks. After that studying the attacks, analyzing and be an impression of the attacks and the attackers. This is what distinguishes it from traditional intrusion detection systems. Still Denial of Service (DoS) attacks pose a major challenge in the online world to this day. DoS attacks characterized by many features such as easy to launch, and a large-scale, used by novices to the presence of tools based attacks .Therefore, most of the research’s concerned with disclosure of denial of service attacks. In this work a high interaction honeypot is designed to detect Denial of Service attacks by analyzing packets and extracting their features, by applying one of decision tree algorithm (C4.5) to detect attacks. The proposed Honeypot monitors the system and analyzes events to detect unknown attacks by Open Source Security (OSSec). |
Index Terms — Honeypot, DoS, Decision tree, OSSEC. |
Design of a Neural Controller Applied a Level System in Hart Protocol |
Pages: 46-51 (6) | [Full Text] PDF (1.01 MB) |
MURILLO FERREIRA DOS SANTOS, KAMILA PERES ROCHA, MARLON JOSÉ DO CARMO |
Intelligent Robotic Group – GRIn, Juiz de Fora Federal University, Juiz de Fora, Minas Gerais - Brazil CEFET-MG Campus III Leopoldina, Department of Electronics, Leopoldina, Minas Gerais - Brazil |
Abstract — This paper presents a design of a neural controller for industrial level systems. The level process has an asymmetric dynamic and its control is not a simple process of performing. This work presents an advanced control technique using intelligent control with artificial neural networks. The proposal is to implement a network of multilayer perceptron with a PI controller for controlling a level system based on a SMAR® didactic plant with Hart protocol. The control strategy is implemented with Matlab®. This software makes a communication with the plant through OPC (OLE for process control). The project demonstrates the practical feasibility and applicability of intelligent tools industrial systems, thus generating a gain in experimental learning, commonly found in the labor market. |
Index Terms — Hart Networks, Artificial Neural Networks, Process Control, Nonlinear systems, Industrial Networks |