首页 > 最新文献

Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

英文 中文
IoT based Smart Traffic Signal: Time Stealer 基于物联网的智能交通信号:窃取时间
Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401144
Adeel Munawar
The increased numbers of private vehicles on the roads has added much to the traffic congestions and wait time at the intersections. To make cities smart and smart cities smarter by reducing this problem, the number of systems has been and is being developed, as it also causes the wastage of time, fuel and also increases air and noise pollution. In this paper, we present a system ‘Time Stealer’ which will check the density of the traffic on the sides of the road and will give green light time accordingly keeping in view that all sides get their turn. This system will reduce the wait time that vehicles do even when there is no traffic on the green side and will also avoid signal jumping which is very common in our country and also a cause of the number of accident.
道路上私家车数量的增加大大增加了交通拥堵和十字路口的等待时间。为了通过减少这个问题使城市变得更智能,智能城市变得更智能,已经和正在开发的系统数量,因为它也会造成时间,燃料的浪费,也会增加空气和噪音污染。在本文中,我们提出了一个“偷时间”系统,它会检查道路两侧的交通密度,并相应地给出绿灯时间,同时考虑到所有方面都有机会。该系统将减少车辆在绿灯侧没有车辆的情况下的等待时间,也将避免我国常见的跳号现象,这也是造成事故数量的原因之一。
{"title":"IoT based Smart Traffic Signal: Time Stealer","authors":"Adeel Munawar","doi":"10.54692/lgurjcsit.2020.0401144","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401144","url":null,"abstract":"The increased numbers of private vehicles on the roads has added much to the traffic congestions and wait time at the intersections. To make cities smart and smart cities smarter by reducing this problem, the number of systems has been and is being developed, as it also causes the wastage of time, fuel and also increases air and noise pollution. In this paper, we present a system ‘Time Stealer’ which will check the density of the traffic on the sides of the road and will give green light time accordingly keeping in view that all sides get their turn. This system will reduce the wait time that vehicles do even when there is no traffic on the green side and will also avoid signal jumping which is very common in our country and also a cause of the number of accident.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Various Load Balancing Techniques in a Centralized and Distributed Cloud Computing Environment 集中式和分布式云计算环境下各种负载均衡技术的比较
Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401143
Khadija Javed
cloud computing presently plays a significant job in our lives. The cloud is a platform that provides high accessibility, dynamic asset pools, and virtualization. By improving, it enables a huge reduction in cost. Load Balance in cloud computing is very important. For cloud computing, there are different techniques available that have different parameters. Many methods are used centrally and some are used in cloud computing distributed environments. In this exploration, we have thought about both, brought together and conveyed methods after picking the best load-balancing procedure that depends on various parameters, for example, execution, over-burden, throughput, reaction time, and movement time.
云计算目前在我们的生活中扮演着重要的角色。云是一个提供高可访问性、动态资产池和虚拟化的平台。通过改进,它可以大大降低成本。云计算中的负载平衡非常重要。对于云计算,有不同的可用技术,它们具有不同的参数。许多方法集中使用,有些方法在云计算分布式环境中使用。在本文中,我们考虑了这两种方法,在选择最佳负载平衡过程(取决于各种参数,例如执行、超载、吞吐量、反应时间和移动时间)之后,将它们结合在一起并传递方法。
{"title":"Comparison of Various Load Balancing Techniques in a Centralized and Distributed Cloud Computing Environment","authors":"Khadija Javed","doi":"10.54692/lgurjcsit.2020.0401143","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401143","url":null,"abstract":"cloud computing presently plays a significant job in our lives. The cloud is a platform that provides high accessibility, dynamic asset pools, and virtualization. By improving, it enables a huge reduction in cost. Load Balance in cloud computing is very important. For cloud computing, there are different techniques available that have different parameters. Many methods are used centrally and some are used in cloud computing distributed environments. In this exploration, we have thought about both, brought together and conveyed methods after picking the best load-balancing procedure that depends on various parameters, for example, execution, over-burden, throughput, reaction time, and movement time.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach of Tailoring PMBOK activities that best suit Software Development Projects 裁剪最适合软件开发项目的PMBOK活动的新方法
Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401140
Waleed Iftikhar
Project management is very critical for any project's success regardless of its category. Various Project management methodologies are available that provide set of guidelines and standards to effectively and efficiently manage projects in the organization. Managing software development projects has faced a lot of challenges while complying with these project management methodologies. This is mainly because project management methodologies like PMBOK does not provide specific guidelines for managing software development projects. This embarks the importance of project management tailoring activities in the software development firms, to tailor these project management methodologies according to their own need. This paper will propose six most essential tailoring activities for managing software development projects. These tailoring activities will be performed on the project management body of knowledge (PMBOK).
项目管理对于任何项目的成功都是至关重要的,无论其类别如何。各种项目管理方法提供了一套指导方针和标准,以有效和高效地管理组织中的项目。在遵循这些项目管理方法的同时,管理软件开发项目面临着许多挑战。这主要是因为像PMBOK这样的项目管理方法并没有为管理软件开发项目提供具体的指导方针。这就表明了软件开发公司中项目管理裁剪活动的重要性,根据他们自己的需要裁剪这些项目管理方法。本文将提出管理软件开发项目的六个最基本的裁剪活动。这些裁剪活动将在项目管理知识体系(PMBOK)上执行。
{"title":"A Novel Approach of Tailoring PMBOK activities that best suit Software Development Projects","authors":"Waleed Iftikhar","doi":"10.54692/lgurjcsit.2020.0401140","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401140","url":null,"abstract":"Project management is very critical for any project's success regardless of its category. Various Project management methodologies are available that provide set of guidelines and standards to effectively and efficiently manage projects in the organization. Managing software development projects has faced a lot of challenges while complying with these project management methodologies. This is mainly because project management methodologies like PMBOK does not provide specific guidelines for managing software development projects. This embarks the importance of project management tailoring activities in the software development firms, to tailor these project management methodologies according to their own need. This paper will propose six most essential tailoring activities for managing software development projects. These tailoring activities will be performed on the project management body of knowledge (PMBOK).","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129559235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Yolo with Dropout 优化Yolo与Dropout
Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401145
Mubashir Ali
The goal is to recognize different objects by applying the YOLO (You Only Look Once) technique. This technique has a few benefits in contrast to any other techniques for object detection and tracking. In some codes as Fast Convolutional Neural Network (FCNN) and Convolutional Neural Network (CNN) the code will not focus at the picture entirely but for the case of YOLO, the code focuses the entire image by concluding the detection boxes utilizing a convolutional neural framework and the probability of classes for the bounding boxes and finds the image immediately in contrast to some different codes. The dropout layer is also programed at the end to avoid over fitting issues. It is seen that using dropout the results have improved much.
目标是通过应用YOLO(你只看一次)技术来识别不同的对象。与任何其他用于对象检测和跟踪的技术相比,这种技术有一些好处。在一些代码中,如快速卷积神经网络(FCNN)和卷积神经网络(CNN),代码不会完全聚焦于图像,但对于YOLO的情况,代码通过利用卷积神经框架和边界框的类的概率总结检测框来聚焦整个图像,并立即找到图像与一些不同的代码进行对比。dropout层也在最后编程,以避免过度拟合问题。可以看出,使用dropout后,结果有了很大的改善。
{"title":"Optimized Yolo with Dropout","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2020.0401145","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401145","url":null,"abstract":"The goal is to recognize different objects by applying the YOLO (You Only Look Once) technique. This technique has a few benefits in contrast to any other techniques for object detection and tracking. In some codes as Fast Convolutional Neural Network (FCNN) and Convolutional Neural Network (CNN) the code will not focus at the picture entirely but for the case of YOLO, the code focuses the entire image by concluding the detection boxes utilizing a convolutional neural framework and the probability of classes for the bounding boxes and finds the image immediately in contrast to some different codes. The dropout layer is also programed at the end to avoid over fitting issues. It is seen that using dropout the results have improved much.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm 基于IPK算法的AIoT设备的智能安全通信
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030487
Muhammad Adnan Khan
Artificial intelligence Internet of Things (AIoT) will be a necessary part of our lives in the near future. It will be found as quick cooperation in our surroundings through the related sensor-based system. To be sure, even in an indirect method, it will serve us in a couple of structures as esteem included organizations over the cell stages. With the AIoT structures that make usage of data, actually, the data collection from contraptions can in like manner be a goal of cyberattacks. Device to Device (D-2-D) interchanges in AIoT was planned alongside various shows, for instance, Constrained Access Protocol (CoAP). Its huge stresses in the course of action of AIoT are to ensure the security of mechanisms and D-2-D one place to another. Furthermore, present correspondence shows for AIoT arewithout reliability features. It is a result of this that countermeasures in perspective on encryption are starting at now getting importance. There is a requirement for a solid cryptosystem for D-2-D in AIoT. In this investigation paper, we present an encryption technique which is indicated as EPEB as a security answer for AIoT. The proposed methodology works with the message which shows special characters, numbers, and bits for data encryption and decryption. In authority, the end key isn't known so we would encryption to able have the option to gadgets data using particular keys and scramble packet per specialkey.
在不久的将来,人工智能物联网(AIoT)将成为我们生活中必不可少的一部分。通过相关的基于传感器的系统,我们将发现在我们周围的快速合作。可以肯定的是,即使是间接的方法,它也会在细胞阶段的一些结构中为我们服务。实际上,使用数据的AIoT结构,从装置收集的数据也可以以类似的方式成为网络攻击的目标。AIoT中的设备到设备(D-2-D)交换计划与各种演示一起进行,例如约束访问协议(CoAP)。其在AIoT行动过程中的巨大压力是确保机制和D-2-D从一个地方到另一个地方的安全性。此外,目前的通信表明,AIoT缺乏可靠性特征。因此,从加密角度出发的对策开始变得越来越重要。在AIoT中,对D-2-D有一个可靠的密码系统的要求。在这篇研究论文中,我们提出了一种加密技术,称为EPEB作为AIoT的安全答案。所提出的方法适用于显示特殊字符、数字和位的消息,用于数据加密和解密。在权威中,终端密钥是不知道的,所以我们可以加密,以便能够选择使用特定密钥来gadget数据,并根据特定密钥对数据包进行加密。
{"title":"An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm","authors":"Muhammad Adnan Khan","doi":"10.54692/lgurjcsit.2019.030487","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030487","url":null,"abstract":"Artificial intelligence Internet of Things (AIoT) will be a necessary part of our lives in the near future. It will be found as quick cooperation in our surroundings through the related sensor-based system. To be sure, even in an indirect method, it will serve us in a couple of structures as esteem included organizations over the cell stages. With the AIoT structures that make usage of data, actually, the data collection from contraptions can in like manner be a goal of cyberattacks. Device to Device (D-2-D) interchanges in AIoT was planned alongside various shows, for instance, Constrained Access Protocol (CoAP). Its huge stresses in the course of action of AIoT are to ensure the security of mechanisms and D-2-D one place to another. Furthermore, present correspondence shows for AIoT arewithout reliability features. It is a result of this that countermeasures in perspective on encryption are starting at now getting importance. There is a requirement for a solid cryptosystem for D-2-D in AIoT. In this investigation paper, we present an encryption technique which is indicated as EPEB as a security answer for AIoT. The proposed methodology works with the message which shows special characters, numbers, and bits for data encryption and decryption. In authority, the end key isn't known so we would encryption to able have the option to gadgets data using particular keys and scramble packet per specialkey.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116417870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovery Method for Disasters of Network Servers by Using POX controller in Software defined Networks. 软件定义网络中基于POX控制器的网络服务器灾难恢复方法。
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030492
Asis Jamal, Sarah Javed, Arslan Akram, Shahzaib Jamal
The devices we used to automation made up of electric bunch called IoT devices so the more complex task is to manage them effectively. If the devices cannot connect or share anything correctly then these devices will be considered as useless. So the diversity of these devices will be increase the chance of survival. When we talk about the disaster the main difference between networks software and hardware needed to be overcome . for this we have to control the data traffic smartly so the software defined networks make this thing possible to give more programmability because in SDN the data plane is separated from control plane. When IoT devices got disconnected because of internet lack at that time these devices have to respond quickly. So for this purpose, software defined networks used to search another path for information transfer just to get that connection back we can say SDN provides reroute based on the routing information and routing flows they have already and they also have better understanding of pathways for communication. So in this paper our main focus is on this problem that will occur because of disaster and we intend to recover server and also multiple servers from this disaster of link failure , traffic engineering , power outage and rerouting of packets. For this we proposed a systematic approach for recovering these servers from disaster by using software defined networks. The separation of control plane from data plane provides programmability and also make the system flexible for getting back the connection soon. So for this recovery from disaster we are going to use OpenFlow protocol used by SDN and we using Mininet to implementation. The controller will be POX and also we are using Lipsflow mapping for disaster management and recovery.
我们用于自动化的设备由称为物联网设备的电子束组成,因此更复杂的任务是有效地管理它们。如果设备不能正确连接或共享任何东西,那么这些设备将被认为是无用的。所以这些设备的多样性将增加生存的机会。当我们谈论灾难时,需要克服网络软件和硬件之间的主要差异。为此,我们必须巧妙地控制数据流量,所以软件定义的网络使这一切成为可能,提供更多的可编程性,因为在SDN中,数据平面与控制平面是分离的。当物联网设备由于当时缺乏互联网而断开连接时,这些设备必须快速响应。因此,为了这个目的,软件定义的网络用于搜索信息传输的另一条路径,只是为了恢复连接,我们可以说SDN提供了基于路由信息和路由流的重路由,它们也更好地理解了通信的路径。因此,在本文中,我们的主要重点是这个问题,将会发生,因为灾难,我们打算恢复服务器和多个服务器从这个灾难的链路故障,流量工程,停电和数据包重路由。为此,我们提出了一种系统的方法,通过使用软件定义的网络从灾难中恢复这些服务器。控制平面与数据平面的分离提供了可编程性,也使系统能够灵活地快速恢复连接。因此,为了从灾难中恢复,我们将使用SDN使用的OpenFlow协议,并使用Mininet来实现。控制器将是POX,我们还使用Lipsflow映射进行灾难管理和恢复。
{"title":"Recovery Method for Disasters of Network Servers by Using POX controller in Software defined Networks.","authors":"Asis Jamal, Sarah Javed, Arslan Akram, Shahzaib Jamal","doi":"10.54692/lgurjcsit.2019.030492","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030492","url":null,"abstract":"The devices we used to automation made up of electric bunch called IoT devices so the more complex task is to manage them effectively. If the devices cannot connect or share anything correctly then these devices will be considered as useless. So the diversity of these devices will be increase the chance of survival. When we talk about the disaster the main difference between networks software and hardware needed to be overcome . for this we have to control the data traffic smartly so the software defined networks make this thing possible to give more programmability because in SDN the data plane is separated from control plane. When IoT devices got disconnected because of internet lack at that time these devices have to respond quickly. So for this purpose, software defined networks used to search another path for information transfer just to get that connection back we can say SDN provides reroute based on the routing information and routing flows they have already and they also have better understanding of pathways for communication. So in this paper our main focus is on this problem that will occur because of disaster and we intend to recover server and also multiple servers from this disaster of link failure , traffic engineering , power outage and rerouting of packets. For this we proposed a systematic approach for recovering these servers from disaster by using software defined networks. The separation of control plane from data plane provides programmability and also make the system flexible for getting back the connection soon. So for this recovery from disaster we are going to use OpenFlow protocol used by SDN and we using Mininet to implementation. The controller will be POX and also we are using Lipsflow mapping for disaster management and recovery.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Storage Security Using Blockchain Technology 使用区块链技术的云存储安全
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030489
Fahad Ahamd
Data is increasing with increasing Internet technology. To handle the large data, more applications choose to enlarge storage capacity via Cloud plate form. It will not a surprise if we say most organizations have moved towards the cloud. While using the cloud, we have to keep our trust for our sensitive and private data in third parties and the data is usually not encrypted. But we need to implement nearly procedures for the assurance of our reserved data. This will be occupied by blockchains. Blockchain has been a center of attention as a next-generation goal because of its security. A comprehensive approach is used in this paper by signifying diverse blockchain methods to protect cloud computing.
随着互联网技术的发展,数据也在不断增加。为了处理大数据,越来越多的应用选择通过云盘的形式来扩大存储容量。如果我们说大多数组织已经转向云计算,这并不奇怪。在使用云计算时,我们必须对第三方的敏感和私人数据保持信任,这些数据通常不会加密。但是我们需要实现几乎所有的程序来保证我们保留的数据。这将被区块链所占据。区块链因其安全性而成为下一代目标的关注焦点。本文通过标记各种区块链方法来使用综合方法来保护云计算。
{"title":"Cloud Storage Security Using Blockchain Technology","authors":"Fahad Ahamd","doi":"10.54692/lgurjcsit.2019.030489","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030489","url":null,"abstract":"Data is increasing with increasing Internet technology. To handle the large data, more applications choose to enlarge storage capacity via Cloud plate form. It will not a surprise if we say most organizations have moved towards the cloud. While using the cloud, we have to keep our trust for our sensitive and private data in third parties and the data is usually not encrypted. But we need to implement nearly procedures for the assurance of our reserved data. This will be occupied by blockchains. Blockchain has been a center of attention as a next-generation goal because of its security. A comprehensive approach is used in this paper by signifying diverse blockchain methods to protect cloud computing.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130734655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Testing for cyber Security 网络安全软件测试
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030493
Arfa Hasan, Muhammad Adnan Khan
Software testing plays a vital role in software security because hackers attack on a system through back channels which they can easily find if there is any error or bug exists in the software. The software security failure can cause the unbearable loss for IT companies and other organizations. Cyber security is another big issue for computer users' personal data as all their information is vulnerable because of easy excess, visibility and availability. Therefore, software testing is also useful to secure the personal information. In this article, cyber security testing based on particle swam optimization algorithm (CST) is proposed for testing of software cyber security testing. CSTPSOA is a PSO base technique which is used to solve the complex multi-level problems and is also used for optimization. In the CST method PSO is used for the optimization of test cases for cyber security testing.
软件测试在软件安全中起着至关重要的作用,因为黑客通过反向通道攻击系统,他们可以很容易地发现软件中是否存在任何错误或缺陷。软件安全故障会给IT公司和其他组织造成难以承受的损失。网络安全是电脑用户个人数据的另一个大问题,因为他们的所有信息都很容易被过剩、可见和可用。因此,软件测试对保护个人信息也很有用。本文提出了基于粒子游优化算法(CST)的网络安全测试方法,用于软件网络安全测试。CSTPSOA是一种基于PSO的技术,用于解决复杂的多层次问题,也用于优化。在CST方法中,粒子群算法用于网络安全测试用例的优化。
{"title":"Software Testing for cyber Security","authors":"Arfa Hasan, Muhammad Adnan Khan","doi":"10.54692/lgurjcsit.2019.030493","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030493","url":null,"abstract":"Software testing plays a vital role in software security because hackers attack on a system through back channels which they can easily find if there is any error or bug exists in the software. The software security failure can cause the unbearable loss for IT companies and other organizations. Cyber security is another big issue for computer users' personal data as all their information is vulnerable because of easy excess, visibility and availability. Therefore, software testing is also useful to secure the personal information. In this article, cyber security testing based on particle swam optimization algorithm (CST) is proposed for testing of software cyber security testing. CSTPSOA is a PSO base technique which is used to solve the complex multi-level problems and is also used for optimization. In the CST method PSO is used for the optimization of test cases for cyber security testing.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"174 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133578744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preservation of Privacy of Big Data Using Efficient Anonymization Technique 利用高效匿名化技术保护大数据隐私
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030488
Fahad Ahamd
Big data needs to be kept private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.
由于数据量的增加,大数据需要保密。数据是从社交网络、组织和各种其他方式产生的,这被称为大数据。大数据需要大的存储空间和高的计算能力。在每个阶段,都需要保护数据。隐私保护在保护敏感信息免受任何攻击方面发挥着重要作用。数据匿名化是对数据进行匿名化以保持其私密性和受保护的技术之一,包括抑制、泛化和分类。它使个人和私人数据保持匿名,不被其他人知道。但在大数据上实施时,这些技术造成了很大的信息丢失,也无法保护大数据的隐私。此外,对于大数据场景,匿名化不仅要关注隐藏,还要关注其他方面。本文旨在提供一种将切片、抑制和功能加密相结合的技术,通过数据匿名化来实现更好的大数据隐私。
{"title":"Preservation of Privacy of Big Data Using Efficient Anonymization Technique","authors":"Fahad Ahamd","doi":"10.54692/lgurjcsit.2019.030488","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030488","url":null,"abstract":"Big data needs to be kept private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Architecture for Basketball Supervision 基于物联网的篮球监管架构
Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030490
Mubashir Ali
Basketball is one of the most played games in the world with a huge amount of fan following and has a great number of basketballers. Sometimes players get severe lower body wounds such as ankle sprains, shortage of breath, head, teeth, hand, and fingers. Female players have a higher risk of knee injuries than male players. These are health issues that players face while playing basketball. Sports organizations spend millions to train fresh basketball players or for the development of the previous basketball players. The internet of things (IoT) made everyday things readable, controllable and recognizable through the internet and the wireless sensor networks. It is simply the network of interconnected devices that are embedded with sensors, software, and connectivity modules.Nowadays, with this growing technology it is possible to protect the life of players in the game as well as in training sessions, if we detect the problems early in players and appropriate actions will be taken to reduce adverse health effects which can be very dangerous. In this paper, we will propose an architecturefor basketball based on the internet of things (IoT). The main goal behind this approach is to introduce a healthcare system based upon sensors, actuators, devices and telecommunication technologies to communicating real-time stats.
篮球是世界上最受欢迎的运动之一,拥有大量的球迷和篮球运动员。有时球员会受到严重的下半身受伤,如脚踝扭伤、呼吸困难、头部、牙齿、手和手指。女运动员膝盖受伤的风险比男运动员高。这些都是球员在打篮球时面临的健康问题。体育组织花费数百万美元来培养新的篮球运动员或发展以前的篮球运动员。物联网(IoT)通过互联网和无线传感器网络使日常事物可读、可控和可识别。它仅仅是由嵌入传感器、软件和连接模块的相互连接的设备组成的网络。如今,随着这项不断发展的技术,如果我们及早发现球员的问题,并采取适当的行动来减少对健康的不利影响,这可能是非常危险的,那么就有可能保护球员在比赛和训练中的生命。在本文中,我们将提出一种基于物联网(IoT)的篮球架构。这种方法背后的主要目标是引入一个基于传感器、执行器、设备和电信技术的医疗保健系统,以通信实时状态。
{"title":"IoT Based Architecture for Basketball Supervision","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2019.030490","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030490","url":null,"abstract":"Basketball is one of the most played games in the world with a huge amount of fan following and has a great number of basketballers. Sometimes players get severe lower body wounds such as ankle sprains, shortage of breath, head, teeth, hand, and fingers. Female players have a higher risk of knee injuries than male players. These are health issues that players face while playing basketball. Sports organizations spend millions to train fresh basketball players or for the development of the previous basketball players. The internet of things (IoT) made everyday things readable, controllable and recognizable through the internet and the wireless sensor networks. It is simply the network of interconnected devices that are embedded with sensors, software, and connectivity modules.Nowadays, with this growing technology it is possible to protect the life of players in the game as well as in training sessions, if we detect the problems early in players and appropriate actions will be taken to reduce adverse health effects which can be very dangerous. In this paper, we will propose an architecturefor basketball based on the internet of things (IoT). The main goal behind this approach is to introduce a healthcare system based upon sensors, actuators, devices and telecommunication technologies to communicating real-time stats.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Lahore Garrison University Research Journal of Computer Science and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1