Real time implementation of the software system requires being more versatile. In the maintenance phase, the modified system under regression testing must assure that the existing system remains defect free. Test case prioritization technique of regression testing includes code as well as model based methods of prioritizing the test cases. System model based test case prioritization can detect the severe faults early as compare to the code based test case prioritization. Model based prioritization techniques based on requirements in a cost effective manner has not been taken for study so far. Model based testing used to test the functionality of the software system based on requirement. An effective model based approach is defined for prioritizing test cases and to generate the effective test sequence. The test cases are rescheduled based on requirement analysis and user view analysis. With the use of weighted approach the overall cost is estimated to test the functionality of the model elements. Here, the genetic approach has been applied to generate efficient test path. The regression cost in terms of effort has been reduced under model based prioritization approach.
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and investigated. In this system, features are extracted from the iris using various feature extraction algorithms, namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy improvement offered by the proposed approach also showed that using more than two feature extraction algorithms in extracting the iris system might decrease the system performance. This is due to redundant features. The paper presents a detailed description of the experiments and provides an analysis of the performance of the proposed method.
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
Most of the routing protocols used in Mobile Adhoc Networks (MANET) require update the route information to neighbour
or any other nodes. These route update overhead degrade the performance of routing algorithms as there is a significant routing overhead. Proposed is a technique to reduce route update overhead through the minimization of the routing delay. The aim is to reduce the network congestion and minimize the complexities that are commonly faced by Mobile Adhoc Networks. Here, a clustering mechanism is introduced, which clusters the arriving nodes in the Mobile Adhoc Network. The election strategy is required to elect a particular node from the group of nodes in the cluster to act as the cluster head, based on the resources that are possessed by that node. Experimental results indicate reduced time and routing packets in this scheme
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
In general, there are many methods of biometric identification. But the Iris
recognition is most accurate and secure means of biometric identification. Iris has
many properties which makes it ideal biometric identification. There are many
methods used to identify the Iris location. To locate Iris many traditional methods are
used. In this we proposed such methods which can identify Iris Center(IC) as well as
localize its center. In this paper we are proposing a method which can use novel IC
localization method on the fact that the elliptical shape (ES) of Iris varies according to
the rotation of eye movement. In this paper various IC locations are generated and
stored in database. Finally the location of IC is detected by matching the ES of the Iris
of input eye image withes candidates in DB. In this paper we are comparing different
methods for Iris localization.
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency of investments on R&D. This paper specifies the process of creating the graphical representation using impactful variables, specifying numerical link between the variables and drawing inference from the network.
Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user’s opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to developed an full fledge system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.
Real time implementation of the software system requires being more versatile. In the maintenance phase, the modified system under regression testing must assure that the existing system remains defect free. Test case prioritization technique of regression testing includes code as well as model based methods of prioritizing the test cases. System model based test case prioritization can detect the severe faults early as compare to the code based test case prioritization. Model based prioritization techniques based on requirements in a cost effective manner has not been taken for study so far. Model based testing used to test the functionality of the software system based on requirement. An effective model based approach is defined for prioritizing test cases and to generate the effective test sequence. The test cases are rescheduled based on requirement analysis and user view analysis. With the use of weighted approach the overall cost is estimated to test the functionality of the model elements. Here, the genetic approach has been applied to generate efficient test path. The regression cost in terms of effort has been reduced under model based prioritization approach.
A Survey of File Replication Techniques In Grid SystemsEditor IJCATR
Grid is a type of parallel and distributed systems that is designed to provide reliable access to data
and computational resources in wide area networks. These resources are distributed in different geographical
locations. Efficient data sharing in global networks is complicated by erratic node failure, unreliable network
connectivity and limited bandwidth. Replication is a technique used in grid systems to improve the
applications’ response time and to reduce the bandwidth consumption. In this paper, we present a survey on
basic and new replication techniques that have been proposed by other researchers. After that, we have a full
comparative study on these replication strategies
Evaluation of Iris Recognition System on Multiple Feature Extraction Algorith...Editor IJCATR
Multi-algorithmic approach to enhancing the accuracy of iris recognition system is proposed and investigated. In this system, features are extracted from the iris using various feature extraction algorithms, namely LPQ, LBP, Gabor Filter, Haar, Db8 and Db16. Based on the experimental results, it is demonstrated that Mutli-algorithms Iris Recognition System is performing better than the unimodal system. The accuracy improvement offered by the proposed approach also showed that using more than two feature extraction algorithms in extracting the iris system might decrease the system performance. This is due to redundant features. The paper presents a detailed description of the experiments and provides an analysis of the performance of the proposed method.
Route Update Overhead Reduction in MANETS Using Node ClusteringEditor IJCATR
Most of the routing protocols used in Mobile Adhoc Networks (MANET) require update the route information to neighbour
or any other nodes. These route update overhead degrade the performance of routing algorithms as there is a significant routing overhead. Proposed is a technique to reduce route update overhead through the minimization of the routing delay. The aim is to reduce the network congestion and minimize the complexities that are commonly faced by Mobile Adhoc Networks. Here, a clustering mechanism is introduced, which clusters the arriving nodes in the Mobile Adhoc Network. The election strategy is required to elect a particular node from the group of nodes in the cluster to act as the cluster head, based on the resources that are possessed by that node. Experimental results indicate reduced time and routing packets in this scheme
Iris Localization - a Biometric Approach Referring Daugman's AlgorithmEditor IJCATR
In general, there are many methods of biometric identification. But the Iris
recognition is most accurate and secure means of biometric identification. Iris has
many properties which makes it ideal biometric identification. There are many
methods used to identify the Iris location. To locate Iris many traditional methods are
used. In this we proposed such methods which can identify Iris Center(IC) as well as
localize its center. In this paper we are proposing a method which can use novel IC
localization method on the fact that the elliptical shape (ES) of Iris varies according to
the rotation of eye movement. In this paper various IC locations are generated and
stored in database. Finally the location of IC is detected by matching the ES of the Iris
of input eye image withes candidates in DB. In this paper we are comparing different
methods for Iris localization.
Strategic Management of Intellectual Property: R&D Investment Appraisal Using...Editor IJCATR
Company executives are under increasing pressure to proactively evaluate the benefits of the huge amounts of investment into intellectual property (IP). The main goal of this paper is to propose a Dynamic Bayesian Network as a tool for modeling the forecast of the distribution of Research and Development (R&D) investment efficiency towards the strategic management of IP. Dynamic Bayesian Network provides a framework for handling the uncertainties and impression in the qualitative and quantitative data that impact the effectiveness and efficiency of investments on R&D. This paper specifies the process of creating the graphical representation using impactful variables, specifying numerical link between the variables and drawing inference from the network.
Humans communication is generally under the control of emotions and full of opinions. Emotions and their opinions plays an important role in thinking process of mind, influences the human actions too. Sentiment analysis is one of the ways to explore user’s opinion made on any social media and networking site for various commercial applications in number of fields. This paper takes into account the basis requirements of opinion mining to explore the present techniques used to developed an full fledge system. Is highlights the opportunities or deployment and research of such systems. The available tools used for building such applications have even presented with their merits and limitations.
Do you know of a promising small business that might benefit from a mentoring relationship with one of Georgias leading corporations? The deadline is approaching to submit applications for the Mentor Protégé Connection, Georgias landmark program that pairs small businesses with global movers and shakers. For more details, please visit: http://www.georgia.org/mentorprotege
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
Rimediare all'inquinamento ambientale certificando i nostri edifici attravers...Andrea Ursini Casalena
Visti i problemi ambientali che procuriamo, vediamo come possiamo iniziare a rimediare certificando i nostri edifici attraverso una progettazione sapiente e rivolta alla sostenibilità
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
This paper involves an experimental investigation on the flexural behaviour of curved beams and comparison of its results with conventional beams. Curved beams of size 1200 x 150 x 100 mm with varying initial curvature as 4000mm, 2000mm and the concrete strength as M40 is considered. Various reinforcement are provided in the curved beams to predict which reinforcement detail would give more resistant over maximum loading. The material properties of cement, fine aggregate, coarse aggregate and the compressive strength of concrete cube were found out. A total of 12 specimens of curved beams were casted with various combination of reinforcement along with three control specimens. The beams are tested under two point loading both horizontally and vertically. The deflection and maximum moment carrying capacity are investigated to understand its strength. Also analytical modelling is done to determine the ultimate moment carrying capacity using Finite Element Software ABAQUS to compare with the experimental model.
Stability behavior of second order neutral impulsive stochastic differential...Editor IJCATR
In this article, we study the existence and asymptotic stability in pth moment of mild solutions to second order neutral stochastic partial differential equations with delay. Our method of investigating the stability of solutions is based on fixed point theorem and Lipchitz conditions being imposed.
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
Among the various forms of malware attacks such as Denial of service, Sniffer, Buffer overflows are the most dreaded threats to computer networks. These attacks are known as botnet attacks and self-propagating in nature and act as an agent or user interface to control the computers which they attack. In the process of controlling a malware, Bot header(s) use a program to control remote systems through internet with the help of zombie systems. Botnets are collection of compromised computers (Bots) which are remotely controlled by its originator (Bot-Master) under a common Command-and-Control (C&C) structure. A server commands to the bot and botnet and receives the reports from the bot. The bots use Trojan horses and subsequently communicate with a central server using IRC. Botnet employs different techniques like Honeypot, communication protocols (e.g. HTTP and DNS) to intrude in new systems in different stages of their lifecycle. Therefore, identifying the botnets has become very challenging; because the botnets are upgrading their methods periodically for affecting the networks. Here, the focus on addressing the botnet detection problem in an Enterprise Network
This research introduces novel Solution to mitigate the malicious activities of Botnet attacks through the Principle of component analysis of each traffic data, measurement and countermeasure selection mechanism called Malware Hunter. This system is built on attack graph-based analytical models based on classification process and reconfigurable through update solutions to virtual network-based countermeasures.
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETsEditor IJCATR
A mobile ad hoc network (MANET) is a distributed and Self-organized network. In MANET, network topology frequently changes because of high mobility nodes. Mobility of nodes and battery energy depletion are two major factors that cause loss of the discovered routes. battery power depletion causes the nodes to die and loss of the obtained paths and thus affects the network connectivity. Therefore, a routing protocol for energy efficiency should consider all the aspects to manage the energy consumption in the network. so introducing an energy aware routing protocol, is one of the most important issues in MANET. This paper reviews some energy aware routing protocols. The main purpose energy aware protocols are efficiently use of energy, reducing energy consumption and increasing the network lifetime.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Do you know of a promising small business that might benefit from a mentoring relationship with one of Georgias leading corporations? The deadline is approaching to submit applications for the Mentor Protégé Connection, Georgias landmark program that pairs small businesses with global movers and shakers. For more details, please visit: http://www.georgia.org/mentorprotege
Multiple Downlink Fair Packet Scheduling Scheme in Wi-MaxEditor IJCATR
IEEE 802.16 is standardization for a broadband wireless access in network metropolitan area network (MAN). IEEE 802.16
standard (Wi-Max) defines the concrete quality of service (QoS) requirement, a scheduling scheme and efficient packet scheduling
scheme which is necessary to achieve the QoS requirement. In this paper, a novel waiting queue based on downlink bandwidth
allocation architecture from a number of rtps schedule has been proposed to improve the performance of nrtPS services without any
impaction to other services. This paper proposes an efficient QoS scheduling scheme that satisfies both throughput and delay guarantee
to various real and non-real applications corresponding to different scheduling schemes for k=1,2,3,4. Simulation results show that
proposed scheduling scheme can provide a tight QoS guarantee in terms of delay for all types of traffic as defined in WiMax standards.
This process results in maintaining the fairness of allocation and helps to eliminate starvation of lower priority class services. The
authors propose a new efficient and generalized scheduling schemes for IEEE 802.16 broadband wireless access system reflecting the
delay requirements.
Rimediare all'inquinamento ambientale certificando i nostri edifici attravers...Andrea Ursini Casalena
Visti i problemi ambientali che procuriamo, vediamo come possiamo iniziare a rimediare certificando i nostri edifici attraverso una progettazione sapiente e rivolta alla sostenibilità
A Study of Approaches and Measures aimed at Securing Biometric Fingerprint Te...Editor IJCATR
The need for fool proof authentication procedures away from traditional authentication mechanisms like passwords, security PINS has led to the advent of biometric authentication in information systems. Biometric data extracted from physiological features of a person including but not limited to fingerprints, palm prints, face or retina for purpose of verification & identification is saved as biometric templates. The inception of biometrics in access control systems has not been without its own hitches & like other systems it has its fair share of challenges. Biometric fingerprints being the most mature of all biometric spheres are the most widely adopted biometric authentication systems. Biometric systems effectiveness lies on how secure they are at preventing inadvertent disclosure of biometric templates in an information system‟s archive. This however has not been the case as biometric templates have been fraudulently accessed to gain unauthorized access in identification and verification systems. In order to achieve strong and secure biometric systems, biometric systems developers need to build biometric systems that properly secure biometric templates. Several biometric template protection schemes and approaches have been proposed and used to safeguard stored biometric templates. Despite there being various biometric template protection schemes and approaches in existence, none of them has provided the most authentic, reliable, efficient and deterrent means to totally secure biometric fingerprint templates. This research sought to establish status of the current biometric template protection techniques and methods by conducting a survey and analyzing data gathered from a sample of seventy-eight (78) respondents. We will report these results and give our conclusion based on findings of the survey in this paper.
This paper involves an experimental investigation on the flexural behaviour of curved beams and comparison of its results with conventional beams. Curved beams of size 1200 x 150 x 100 mm with varying initial curvature as 4000mm, 2000mm and the concrete strength as M40 is considered. Various reinforcement are provided in the curved beams to predict which reinforcement detail would give more resistant over maximum loading. The material properties of cement, fine aggregate, coarse aggregate and the compressive strength of concrete cube were found out. A total of 12 specimens of curved beams were casted with various combination of reinforcement along with three control specimens. The beams are tested under two point loading both horizontally and vertically. The deflection and maximum moment carrying capacity are investigated to understand its strength. Also analytical modelling is done to determine the ultimate moment carrying capacity using Finite Element Software ABAQUS to compare with the experimental model.
Stability behavior of second order neutral impulsive stochastic differential...Editor IJCATR
In this article, we study the existence and asymptotic stability in pth moment of mild solutions to second order neutral stochastic partial differential equations with delay. Our method of investigating the stability of solutions is based on fixed point theorem and Lipchitz conditions being imposed.
Malware Hunter: Building an Intrusion Detection System (IDS) to Neutralize Bo...Editor IJCATR
Among the various forms of malware attacks such as Denial of service, Sniffer, Buffer overflows are the most dreaded threats to computer networks. These attacks are known as botnet attacks and self-propagating in nature and act as an agent or user interface to control the computers which they attack. In the process of controlling a malware, Bot header(s) use a program to control remote systems through internet with the help of zombie systems. Botnets are collection of compromised computers (Bots) which are remotely controlled by its originator (Bot-Master) under a common Command-and-Control (C&C) structure. A server commands to the bot and botnet and receives the reports from the bot. The bots use Trojan horses and subsequently communicate with a central server using IRC. Botnet employs different techniques like Honeypot, communication protocols (e.g. HTTP and DNS) to intrude in new systems in different stages of their lifecycle. Therefore, identifying the botnets has become very challenging; because the botnets are upgrading their methods periodically for affecting the networks. Here, the focus on addressing the botnet detection problem in an Enterprise Network
This research introduces novel Solution to mitigate the malicious activities of Botnet attacks through the Principle of component analysis of each traffic data, measurement and countermeasure selection mechanism called Malware Hunter. This system is built on attack graph-based analytical models based on classification process and reconfigurable through update solutions to virtual network-based countermeasures.
A Survey of Existing Mechanisms in Energy-Aware Routing In MANETsEditor IJCATR
A mobile ad hoc network (MANET) is a distributed and Self-organized network. In MANET, network topology frequently changes because of high mobility nodes. Mobility of nodes and battery energy depletion are two major factors that cause loss of the discovered routes. battery power depletion causes the nodes to die and loss of the obtained paths and thus affects the network connectivity. Therefore, a routing protocol for energy efficiency should consider all the aspects to manage the energy consumption in the network. so introducing an energy aware routing protocol, is one of the most important issues in MANET. This paper reviews some energy aware routing protocols. The main purpose energy aware protocols are efficiently use of energy, reducing energy consumption and increasing the network lifetime.
The technology behind information systems in today’s world has been embedded in nearly every aspect of our lives. Thus, the idea of securing our information systems and/or computer networks has become very paramount. Owing to the significance of computer networks in transporting the information and knowledge generated by the increased diversity and sophistication of computational machinery, it would be very imperative to engage the services of network security professionals to manage the resources that are passed through the various terminals (end points) of the these network, so as to achieve a maximum reliability of the information passed, making sure that this is achieved without creating a discrepancy between the security and usability of such network. This paper examines the various techniques involved in securely maintaining the safe states of an active computer network, its resources and the information it carries. We examined techniques of compromising an information system by breaking into the system without authorised access (Hacking), we also looked at the various phases of digital analysis of an already compromised system, and then we investigated the tools and techniques for digitally analysing a compromised system in other to bring it back to a safe state.
Kategoria: Pedagogika
Temat: Stadia rozwoju moralnego
Autor: Poradnia Profilaktyczno-Terapeutyczna w Zielonej Górze
Słowa klucze: Pedagogika, Rozwój moralny, Moralność, KNBB, Poradnia, Zielona Góra, Warsztaty
Obliczanie potęg liczb w pierścieniach, dowody, postać kanoniczna liczb i wielomianów w pierścieniach, wyznaczanie NWD i NWW liczb i wielomianów w pierścieniach.
Analiza Matematyczna 2, przeznaczona (teoretycznie) dla studentów Politechniki Wrocławskiej. Jednak, definicje i twierdzenia są wszechobecne, stąd wersja PDF znajduje się w naszej biblioteczce.