-
Enhanced Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data
Pourush,
Naresh Sharma,
Manish Bhardwaj
Issue:
Volume 4, Issue 3, June 2015
Pages:
25-31
Received:
16 March 2015
Accepted:
25 March 2015
Published:
14 April 2015
Abstract: To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search. Related works on searchable encryption emphasis on single keyword based search or Boolean keyword based search, and hardly work on sorting the search results. Our work focuses on realizing secure semantic search through query keyword semantic extension. We mix-ups and used architecture of two clouds, explicitly private cloud and public cloud. The search process is distributed into two steps. The leading step develops the question keyword upon warehoused database in the private cloud. The subsequent step uses the drawn-out query keywords set to recover the index on public cloud. Finally the matched files are resumed in order. Complete security analysis shows that our explanation is privacy-preserving and secure. Trial evaluation determines the efficiency and effectiveness of the scheme.
Abstract: To protect the privacy, sensitive information has to be encrypted before outsourcing to the cloud. Thus the effective data uct keyword search. Related works on searchable encryption emphasis on single keyword based search or Boolean keyword based search, and hardly work on sorting the search results. Our work focuses on realizing secure semantic se...
Show More
-
Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm
Purvi Garg,
Shivangi Varshney,
Manish Bhardwaj
Issue:
Volume 4, Issue 3, June 2015
Pages:
32-36
Received:
16 March 2015
Accepted:
6 April 2015
Published:
27 April 2015
Abstract: Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.
Abstract: Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations...
Show More
-
Performance Analysis of Hybrid Web Caching Architecture
Ho Khanh Lam,
Nguyen Xuan Truong
Issue:
Volume 4, Issue 3, June 2015
Pages:
37-43
Received:
1 April 2015
Accepted:
14 April 2015
Published:
27 April 2015
Abstract: The development of next-generation wireless networks combine with the radio network techniques which use technology such as GSM, GPRS, 3G (UMTS, CDMA2000), LTE, WLAN, and WiMAX. It requires the construction and expansion in time of high-speed telecommunication channels for the level of the internet service provider (ISP). In fact, in many developing countries and in Vietnam, the investment rate increased bandwidth capacity can not enough for the demand use the Internet as economic issues, investment procedures. Web caching architecture is one of the effective solutions to save bandwidth while ensuring to satisfy strong demand for internet access. Hybrid web caching architecture (hybrid web caching architecture) is a solution that is used by networks because it takes advantage of the strengths of the web caching architecture stratification and dispersion, reducing connection time and transmission time, helping internet service providers to plan and save network resources at each level in an optimal way. This paper propose a novel produce to hybrid web caching architecture based on the determined time at each level of web-winning network and web time overall winner of the ISP network with n-level network.
Abstract: The development of next-generation wireless networks combine with the radio network techniques which use technology such as GSM, GPRS, 3G (UMTS, CDMA2000), LTE, WLAN, and WiMAX. It requires the construction and expansion in time of high-speed telecommunication channels for the level of the internet service provider (ISP). In fact, in many developin...
Show More
-
Static Heuristics Classifiers as Pre-Filter for Malware Target Recognition (MATR)
Anuj Lohani,
Aditi Lohani,
Jitendra Singh,
Manish Bhardwaj
Issue:
Volume 4, Issue 3, June 2015
Pages:
44-48
Received:
18 March 2015
Accepted:
6 April 2015
Published:
11 May 2015
Abstract: Now a day’s malware are one of the major threats to computer information system. The current malware detection technologies have certain significant limitations on their part. Different organizations which deal with the protection of sensitive information may face the problem in identifying recent malware threats among millions and billions of benign executables using just signature-based antivirus systems. Currently for frontline defense against malware, signature-based antivirus products are used by organization.In the undergoing project, we proposed a detection approach by using static heuristics in MATR for malware in PE (portable executable) files. The project suggestslarger performance-based malware target recognition architecture that at present use only static heuristic features.Results of the experiments show that this architecture achieves an overall test accuracy of greater than 98% againstmalware set collected from various operational environments, while most antivirus provide detection accuracy of only 60% at their most sensitive configuration [1]. Implementations of this architecture enables benign executables to be classified successfully to some extent providing enhanced awareness of operators in hostile environments it also enable detection of unknown malware. We are to show the performance of Bagging and AdaBoostensemble.
Abstract: Now a day’s malware are one of the major threats to computer information system. The current malware detection technologies have certain significant limitations on their part. Different organizations which deal with the protection of sensitive information may face the problem in identifying recent malware threats among millions and billions of beni...
Show More
-
Portable Weather System for Measure and Monitoring Temperature, Relative Humidity, and Pressure, Based on Bluetooth Communication
Edgar Manuel Cano Cruz,
Juan Gabriel Ruiz Ruiz
Issue:
Volume 4, Issue 3, June 2015
Pages:
49-53
Received:
21 April 2015
Accepted:
4 May 2015
Published:
13 May 2015
Abstract: The system also proposes a wireless connectivity by using the Bluetooth communication standard providing of a reliable, portable and a low-cost tool for industry where it is necessary to have an environmental control to carry out critical processes. The weather system consist of an embedded system to the development of multimedia applications based on the PIC32 microcontroller, and development is performed using the SPIES methodology for the construct embedded systems. In this paper the design of a portable system that allows monitoring of four climatic variables (temperature, relative humidity, pressure and altitude). The purpose of the system is to serve as an auxiliary tool to make decisions subsystems for environmental control in different areas.
Abstract: The system also proposes a wireless connectivity by using the Bluetooth communication standard providing of a reliable, portable and a low-cost tool for industry where it is necessary to have an environmental control to carry out critical processes. The weather system consist of an embedded system to the development of multimedia applications based...
Show More
-
The Effect of Changing Substrate Material and Thickness on the Performance of Inset Feed Microstrip Patch Antenna
Liton Chandra Paul,
Md. Sarwar Hosain,
Sohag Sarker,
Makhluk Hossain Prio,
Monir Morshed,
Ajay Krishno Sarkar
Issue:
Volume 4, Issue 3, June 2015
Pages:
54-58
Received:
16 April 2015
Accepted:
28 April 2015
Published:
15 May 2015
Abstract: In order to design a microstrip patch antenna at first the designer is to select the substrate material and it’s thickness. So, if the designer has a clear conception about the effect of changing substrate material and it’s thickness on the performance of the antenna, it will be easier to design an antenna. Appropriate selection of dielectric material and it’s thickness is an important task for designing a microstrip patch antenna. This paper represents that how antenna performance changes when we vary substrate material and it’s thickness. The designed inset feed rectangular microstrip patch antenna operates at 2.4GHz (ISM band).
Abstract: In order to design a microstrip patch antenna at first the designer is to select the substrate material and it’s thickness. So, if the designer has a clear conception about the effect of changing substrate material and it’s thickness on the performance of the antenna, it will be easier to design an antenna. Appropriate selection of dielectric mater...
Show More
-
Audio Codecs Impact on Quality of VoIP Based on IEEE802.16e Considering Mobile IP Handover
Ali M. Alsahlany,
Hayder S. Rashid
Issue:
Volume 4, Issue 3, June 2015
Pages:
59-66
Received:
14 May 2015
Accepted:
26 May 2015
Published:
6 June 2015
Abstract: A simulation model using OPNET tool is introduced for testing audio codecs impact on quality of VoIP based on IEEE802.16e with taking into account handover performance. Different parameters that indicate the quality of VoIP such as Throughput, MOS, End to End delay and traffic send and received. According to our simulation the acceptable MOS value is recorded for codecs G.711 and GSM-FR.
Abstract: A simulation model using OPNET tool is introduced for testing audio codecs impact on quality of VoIP based on IEEE802.16e with taking into account handover performance. Different parameters that indicate the quality of VoIP such as Throughput, MOS, End to End delay and traffic send and received. According to our simulation the acceptable MOS value ...
Show More
-
Performance Analysis of CPU-GPU Cluster Architectures
Issue:
Volume 4, Issue 3, June 2015
Pages:
67-74
Received:
17 May 2015
Accepted:
29 May 2015
Published:
11 June 2015
Abstract: High performance computing (HPC) encompasses advanced computation over parallel processing, enabling faster execution of highly compute intensive tasks such as climate research, molecular modeling, physical simulations, cryptanalysis, geophysical modeling, automotive and aerospace design, financial modeling, data mining and more. High performance simulations require the most efficient compute platforms. The execution time of a given simulation depends upon many factors, such as the number of CPU/GPU cores and their utilization factor and the interconnect performance, efficiency, and scalability. CPU and GPU clusters are one of the most progressive branches in a field of parallel computing and data processing nowadays. GPUs have become increasingly common in supercomputing, serving as accelerators or "co-processors" in every node CPU-GPU to help CPUs get work done faster. In this paper I use the Multiclass Closed Product-Form Queueing Network (MCPFQN) and Mean Value Analysis (MVA) to analyze effects of the CPU-GPU cluster interconnect on the performance of computer systems.
Abstract: High performance computing (HPC) encompasses advanced computation over parallel processing, enabling faster execution of highly compute intensive tasks such as climate research, molecular modeling, physical simulations, cryptanalysis, geophysical modeling, automotive and aerospace design, financial modeling, data mining and more. High performance s...
Show More
-
Efficient Sideband Noise Cancellation for Co-located Networks Using ANCT
Nosiri Onyebuchi Chikezie,
Ezeh Gloria Nwabugo,
Agubor Cosmos Kemdirim,
Nkwachukwu Chukwuchekwa
Issue:
Volume 4, Issue 3, June 2015
Pages:
75-84
Received:
21 May 2015
Accepted:
29 May 2015
Published:
10 June 2015
Abstract: An efficient noise cancellation technique for a co-located network was realized using Adaptive Noise Cancellation Technique (ANCT). The technique was developed as improved feature to the classical application of passive filters. The paper focused on achieving a theoretical perfect cancellation considering three essential parameters: the amplitude, phase and delay characteristics of the signal and noise at both the primary path and the reference path of the co-located system. An experimental test-bed of the ANC Architecture was developed using Matlab-Simulink block design which demonstrated the error signals before and after cancellation.
Abstract: An efficient noise cancellation technique for a co-located network was realized using Adaptive Noise Cancellation Technique (ANCT). The technique was developed as improved feature to the classical application of passive filters. The paper focused on achieving a theoretical perfect cancellation considering three essential parameters: the amplitude, ...
Show More