Archive

Enhanced Cyber security for Software Applications

Authors:

Sivaram Rajeyyagari

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00031

Abstract:

Every website developed with web technologies. Security is most widely needed for every website. Cyber security is one of the important prevention for websites. This will protect web applications from various attacks. Many attacks are there such as server attacks, DOS attack, data attack and other types of attacks. This will damage the server and social networking sites to disturb the user data. Various drawbacks are addressed in providing security and privacy. To solve these issues, enhanced cyber security is introduced and provided advanced cyber security for web applications and also for servers. The performance of the proposed system is show in results

Keywords:

Cyber security,cyber crime,cyber ethics,social media,

Refference:

I.A. Avancini, M. Ceccato, “Towards Security Testing with Taint Analysis and Genetic Algorithms”, ICSE Workshop on Software Engineering for Secure Systems, vol. 5, pp.65-71, 2010.
II.L. K. Shar, H. B. K. Tan, “Automated removal of cross site scripting vulnerabilities in web applications”, Inf. Softw. Technol., vol. 54, pp. 467-478, 2012.
III.L. S. Shar, H. B. K. Tan, L. C. Briand, “Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis”, Proc. of Int. Conf. on Software Engineering (ICSE ’13), pp. 642-651, 2013.
IV.Marashdih Abdalla Wasef, “ZaabaZarulFitri Cross Site Scripting Detection Approaches in Web Application”, International Journal of Advanced Computer Science and Applications., vol. 7, no. 10, pp. 155-160, 2016.
V.Meijunjin, “An Approach For Sql Injection Vulnerability Detection”, 2009 Sixth International Conference On Information Technology: New Generations IEEE, pp.1411-1414.
VI.R. Kumar, “Mitigating the authentication vulnerabilities in Web applications through security requirements”, Information and Communication Technologies (WICT), vol. 60,pp. 651-663, 2011.
VII.S. Ali, S.K. Shahzad, H. Javed, “SQLIPA: An Authentication Mechanism Against SQL Injection”, European Journal of Scientific Research, vol. 38, no. 4, pp. 604-611, 2009.
VIII.S. J. Sadana, N. Selam, “Analysis of Cross Site Scripting Attack”, Proc. International Journal of Engineering Research and Applications (IJERA), vol. 1, no. 4, pp. 1764-1773, 2011.
IX.Tajpour Atefeh, Maslin Masrom, Mohammad Zaman Heydari, Suhaimi Ibrahim, “SQL injection detection and prevention tools assessment”, Computer Science and Information Technology (ICCSIT) 2010 3rd IEEE International Conference, vol. 9, pp. 518-522, 2010.
X.Yang Haixia, Nan Zhihong, “A Database Security Testing Scheme Of Web Application”, 4th International Conference On Computer Science And Education, pp. 953-955, 2009.
XI.Y. Li, Z. Wang, T. Guo, “Reflected XSS Vulnerability Analysis”, International Research Journal of Computer Science and Information Systems (IRJCSIS), vol. 2, pp.25-33, 2013.
XII.YongJoonPark, JaeChul Park, “Web Application Intrusion Detection System For Input Validation Attack”, Third 2008 International Conference On Convergence And Hybrid Information Technology IEEE, pp. 498-504.
View Download

The Stable Envelope of Gamma Modules

Authors:

Mehdi S.Abbas, Balsam M.Hamad

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00032

Abstract:

Presume R represents commutative -ring with identity and each R modules is worked on as unitary R modules. We expand in this paper the notion of the stable extension from the modules theory to that of gamma modules. We have studied the stable envelope S(M) of R - module M, and study the relation istween stable envelope, injective envelope E(M) and quasi-injective envelope Q(M) in the gamma modules, we obtain some results on S(M) where we have shown that S(M) is equal to 􀵣𝑎𝑛𝑛􀯋􀳨𝐸(𝑀):􀯋 𝑎𝑛𝑛􀯋􀳨 (𝑁)􀵧M , in case M represents Г − multiplication gamma modules.

Keywords:

injective gamma module,quasi-injective gamma module,fully stable gamma module,Г−multiplication Г−moduleI.Abbas.M. S, On fully stable module, Ph. D. thesis, University of Baghdad (1990). II. Balsam m. Hamad, Some remarks on fully stable gamma modules, to appear . III.Abbas .M. S,Saad .S. A, Shallal .E. A, Injective gamma module, Annals of pure and applied mathematics, vol.12, No.185-94, (2016). IV.Ameri .R, and R. Sudeghi, Gamma modules, Ration mathematica 20 (2010), 127-147. V.Abd Al-Hussain. H, Projective gamma modules and some related notions, Ph.D. Thesis ,Univ. of Mustansiriyah, (2017). VI.Barnes .W. E, On the ring of Nabusuwa, Pacin the case ofic J. math. 18 (1966)m 411-422. VII.Estaji.A. A, A. As. Estaji, A. S. Khorasani, S. Baghdari, On multiplication Γ – modules, Ratio mathematica 26 (2014), 21-38. VIII.X. Ma and J.zhan , Some characterizations of regular and semisimple -rings, kyungpook Math.j.,50(2010),pp.411-417. IX.Nobusuwa .N, on a generalization of the ring theory, Osaka J. Math, 1 (1964), 81-89. ,

Refference:

I.Abbas.M. S, On fully stable module, Ph. D. thesis, University of Baghdad (1990).

II. Balsam m. Hamad, Some remarks on fully stable gamma modules, to appear .

III.Abbas .M. S,Saad .S. A, Shallal .E. A, Injective gamma module, Annals of pure and applied mathematics, vol.12, No.185-94, (2016).

IV.Ameri .R, and R. Sudeghi, Gamma modules, Ration mathematica 20 (2010), 127-147.

V.Abd Al-Hussain. H, Projective gamma modules and some related notions, Ph.D. Thesis ,Univ. of Mustansiriyah, (2017). VI.Barnes .W. E, On the ring of Nabusuwa, Pacin the case ofic J. math. 18 (1966)m 411-422.

VII.Estaji.A. A, A. As. Estaji, A. S. Khorasani, S. Baghdari, On multiplication Γ – modules, Ratio mathematica 26 (2014), 21-38.

VIII.X. Ma and J.zhan , Some characterizations of regular and semisimple -rings, kyungpook Math.j.,50(2010),pp.411-417.

IX.Nobusuwa .N, on a generalization of the ring theory, Osaka J. Math, 1 (1964), 81-89.

View Download

The Usage of Chip Mental Arithmetic in The Topic of Addition and Subtraction for The Whole Number Combination in Year 1

Authors:

R. N. Farah, K. Jayalakshmi

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00033

Abstract:

This research is done to establish the usage of the Chip Mental Arithmetic for the teaching of the addition and subtraction in the whole number combination for Year 1 pupils. Besides that, it also to find out the level of efficiency in the usage of this Chip together with its module based on the performance of the Year 1 pupilson the topics mentioned above. The method used is inference analysis. After using the Mental Arithmetic Number Chip together with its module, it showed the significant differences in the Pre and Post test. The respondents of this project are Year 1 pupils of a school in Selangor who were divided into two groups, the experimental and experimental groups. The data were analyzed by using t-test to determine the differences between pupils of the control group and the experimental group. The findings showed a significant difference of 11.89 with the value [t = 2.084., p <0.05] between the pre and post test for the control group and 51.32 with [t = 2.175, p <0.05] between the pre test and post test for the experimental group. The findings of this research should reflect the usage of this Chip Mental Arithmetic as teaching aids and materials in the classroom, plays as an essential role in enhancing the performance of year 1 pupils as they learn the

Keywords:

chip mental arithmetic,addition, subtraction, whole number, teaching tools,

Refference:

I.Azlan, N.,“Isu-isu Berterusan dalam Pendidikan Matematik”, Jurnal Pendidikan dalam Pendidikan Matematik
14,19–38, 1995.
II.Farah, R.N., Bahirah, N. and Zuraida R.L, “Manipulative Kit Used In Teaching and Learning Topic Addition and Subtraction In 21st Centuries”, Int J Recent Sci Res. 9(11), 29508-29513, 2018.
III.Farah, R.N. and Bahirah, N., “Chip Mental Arithmetic Kit as A New Teaching Aids in Teaching and Learning 21st Century”, Journal of Advanced Research in Dynamical and Control Systems, Issue: 09-Special Issue, 348-352, (2018).
IV.Farah, R.N., Bahirah, N. and Zuraida, R.L., “The Effectiveness of Chip Mental Arithmetic Kit in Teaching and Learning in 21stCenturies for Topic Addition and Subtraction”, Journal of Mechanics of Continua and Mathematical Sciences, 14, 1, 2019.
V.Farah, R.N. and Chin, Y.K ., “The Effectiveness Of Colour Triciare Model InThe Topic Addition And Subtraction Of Algebra”,International Journal of Education andResearch, 5(7), 367-378, 2017.
VI.Farah, R.N., Tarmizee,. M., Rahman, K.A and Zuraida, R.L., “Orthogonal Projector Kit (OPK)
as A New Teaching Aids with Innovation ICT in Teaching and Learning 21 st century”, Journal of Fundamental and Applied Sciences, 10(3s), 338-244, 2017.
VII.Farah R.N., Tarmizee M., Karmina., Zuraida R.L and Irwan N., “Level ofInnovation Diffusion Characteristics On Orthogonal Projector Kit (OPK) As A TeachingAid For Plans And Elevation Topic”, International Journal of Recent Scientific Research, 8 (8), 19543-19546, 2017.
VIII.Hapni, M.E.,“Meningkatkan Kemahiran Murid Dalam Mempermudahkan Ungkapan Algebra Serta Kemahiran Menggunakan Kalkulator Saintifik Melalui Papan Token 10 Ungkapan Algebra Dan Permainan Ular”, 2014.
IX.Idris, N., “Pedagogi Dalam Pendidikan Matematik (1st ed.)”. Kuala Lumpur: Utusan Publications and Distributors Sdn Bhd. 2001.
X. Newfield, D., “Multimodality and Children’s Participation In Classrooms: Instances of research University of the Witwatersrand”,2006.
XI. Zuraida,R.L. , Nancy, R. and Farah, R.N., “ Effectiveness of Using Circle Geometry (CG-Board) Strategy in Learning Circle Geometry towards Form Four Students’ Performance”,American Journal of Humanities and Social Sciences Research (AJHSSR),03, 01,155-163,2019.
View Download

Evaluation of Optimal Edge Detection Operator for Localization of License Plate of Vehicles with Different Orientations

Authors:

ArbabWaseem Abbas, Khalid Saeed, Safdar Nawaz Khan Marwat, Sahibzada AbdurRehmanAbid, Muhammad Akbar Ali Khan, Sadiq Shah

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00034

Abstract:

The research conducted in this paper proposes the digital image processing approach for localization of license plate from entire image of vehicle with different angles and evaluation of the best edge detection operator in extraction of license plate. The license plate localization has vast applications in system automation, recognition and security. In this research, firstly database is developed by capturing/collecting images of 50 vehicle with different angles. Secondly in proposed technique, different edge detection operators i.e. Sobel, Roberts, Prewitt and Canny have been applied in boundary line based extraction. Thirdly results are evaluated, which showed that in proposed model Sobel operator outperforms other edge detection operators in localization of license plate and revealed the experimental results of Sobel 90%, Prewitt 85%, Roberts 40% and Canny 10% for 50images.

Keywords:

Edge Detection Operators, License Plate Localization,Boundary Line Based Extraction.,

Refference:

I.Ahmad, W., Hassan, S. A., Irfan, M. A., Bais, A., Hassan, G. M., Shah, S. A. A., &Yahya, K. M. (2010, October). Design and implementation of real time LPR system on a fixed point DSP.In Emerging Technologies (ICET),
2010 6th International Conference on (pp. 159-163).IEEE.
II.B. V. Kakani, D. Gandhi and S. Jani, 2017 “Improved OCR based automatic vehicle number plate recognition using features trained neural network,” 8th International Conference on Computing, Communication
and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-6.
III.Chang, S. L., Chen, L. S., Chung, Y. C., & Chen, S. W. (2004). Automatic license plate recognition. IEEE transactions on intelligent transportation systems, 5(1), 42-53..
IV. Dandu, B. R., & Chopra, A. (2012). Vehicular number plate recognition
using edge detection and characteristic analysis of national number plates.
Int. J. Comput. Eng. Res, 2(3), 795-799..
V.H. Kawasnicka and B. Wawrzyniak, “License Plate Localization and Recognition in Camera Pictures”, AIMETH 2002, Poland, November 2002.
VI.iying, C., Shunhua, W., Luhong, M., &Xianren, H. (2007). Design of an analog front end for passive UHF RFID transponder IC.CHINESE JOURNAL OF SEMICONDUCTORS-CHINESE EDITION-, 28(5), 686.
VII.Maini, R., &Aggarwal, H. (2009). Study and comparison of various image edge detection techniques. International journal of image processing (IJIP), 3(1), 1-11.
VIII.MITTAL, ARUN, and SUKHWINDER SINGH. “REVIEW OF LICENSE PLATE RECOGNITION (LPR) USING EDGE DETECTION.”International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831;ISSN(E): 2249-7943 Vol. 4, Issue 2, Apr 2014, 197-204.
IX. Ruiz, L. A., Fdez-Sarría, A., &Recio, J. A. (2004, June). Texture feature extraction for classification of remote sensing data using wavelet decomposition: a comparative study. In 20th ISPRS Congress
(Vol. 35,No. part B, pp. 1109-1114).
X.Saha, S., Basu, S., Nasipuri, M., &Basu, D. K. (2009). License Plate localization from vehicle images: An edge based multi-stage approach.International Journal of Recent Trends in Engineering, 1(1), 284-289.
XI.Shrivakshan, G. T., &Chandrasekar, C. (2012). A comparison of various edge detection techniques used in image processing. IJCSI International Journal of Computer Science Issues, 9(5), 272-276.
XII.Tarabek, P. (2012, September). A Real-Time License Plate Localization Method Based on Vertical Edge Analysis. In FedCSIS (pp. 149-154).
XIII.VIT, P. (2016). Comparison of Various Edge Detection Technique.2016.
XIV.Yu, L. (2012). Research on edge detection in license plate recognition. In Second Int. Conf. Computer Application and System Modeling, Paris,France (pp. 1139-1142).
View Download

A Comprehensive Analysis of Cyber Security Attacks in Virtual Organizations with their Mitigation Plans

Authors:

Khalid Saeed, Rohi Tariq, Wajeeha Khalil, Sheeraz Ahmed, Malik Taimur Ali, Farrukh Hassan, M.Naeem Khan Khattak

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00035

Abstract:

Virtual Organization (VO) allows organizations to exchange and share resources among each other as well as they can work in collaboration. Within the VO the workers can be from different organizations and they can have different affiliation. VO offers a different model of communication among enterprises. The communication in VO is based on information and communication technology. The workers of VO communicate and perform activities using the cyber infrastructure. Since VO involves the use of cyber infrastructure which is vulnerable to different possible security attacks and these security attacks can have different consequences. This research identifies the possible vulnerabilities to VO, evaluates different security attacks as well as their consequences and mitigation plan. Moreover at the end there are some proposed guidelines to VO administrators and users to improve the security of VOs. This research paper is the extension of our previous research work.

Keywords:

Virtual Organization,Vulnerabilities,Security Attacks,Security Issues,

Refference:

I. Abdulla, P. (2012). Understanding the Impact of Denial of Service Attacks on Virtual Machines.
II. Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A.,Gianoli, A., …&Spataro, F. (2004). VOMS, an authorization system for virtual organizations.In Grid computing (pp. 33-40).Springer Berlin Heidelberg.
III. ARP Spoofing. Retrieved from https://www.thesecuritybuddy.com/data-breaches-prevention/what-is-
arp-spoofing/on December 8, 2018.
IV.Cummings, J., Finholt, T., Foster, I., Kesselman, C., & Lawrence, K. A. (2008). Beyond being there: A blueprint for advancing the design,development, and evaluation of virtual organizations.V. Darko-Ampem, S., Katsoufi, M., &Giambiagi, P. (2006, October).Secure negotiation in virtual organizations. In Enterprise Distributed Object Computing Conference Workshops, 2006. EDOCW’06. 10th IEEE International
(pp. 48-48). IEEE.
VI.Denial of Service Attack. Retrieved from https://www.blackmoreops.com/2015/10/21/free-dos-attack-tools/
onDecember 4, 2018.
VII. DNS Cache Poisoning. Retrieved from https://techglimpse.com/dns-cache-poison-solution-simple-terms/
on December 8, 2018.
VIII. Higgins, K. J.,Vm’screate potential risks. Technical report, darkREADING, 2007.
http://www.darkreading.com/document.asp?doc_id=117908
IX. Kamel, M., Benzekri, A., Barrère, F., &Laborde, R. (2007, June). Evaluating the Virtual Organizations security solutions using the ISO/IEC 17799 standard.In Technology Management Conference (ICE),
2007 IEEE International (pp. 1-8).IEEE.
X. Kerschbaum, F., Haller, J., Karabulut, Y., & Robinson, P. (2006, May). Pathtrust: A trust-based reputation service for virtual organization formation. In International Conference on Trust Management (pp. 193-
205).Springer, Berlin, Heidelberg.
XI.Kerschbaum, F., & Robinson, P. (2009). Security architecture for virtual organizations of business web services.Journal of Systems Architecture,55(4), 224-232.
XII. Khalil, M. E., Ghani, K., & Khalil, W. (2016, April). Onion architecture: a new approach for XaaS (every-thing-as-a service) based virtual collaborations. In Learning and Technology Conference (L&T), 2016
13th(pp. 1-7). IEEE.
XIII. Khalil, W. (2012).Reference architecture for virtual organization (Doctoral dissertation, uniwien).
XIV. Khalil, W., &Schikuta, E. (2013). A Design Blueprint for Virtual Organizations in a Service Oriented Landscape.arXiv preprint arXiv:1312.5172
XV. Khalil, W., &Schikuta, E. (2012). Virtual organization for computational intelligence. In Human-Computer Interaction: The Agency Perspective (pp. 437-464). Springer, Berlin, Heidelberg.
XVI.Kim, Y. P., Lee, S., Lee, P., & Newby, G. B. (2006, October). Grid Information Retrieval Management System for Dynamically Reconfigurable Virtual Organization.In Grid and Cooperative Computing, 2006.GCC 2006. Fifth International Conference (pp. 301-306). IEEE.
XVII. Kirch, J. (2007). Virtual machine security guidelines.The Center for Internet Security.
XVIII. Kumar, A., Patwari, A., &Sabale, S. User Authentication by Typing Pattern for Computer and Computer based devices.
XIX. Lee, C. A., Desai, N., &Brethorst, A. (2014, December). A Keystone-Based Virtual Organization Management System.In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International
Conference on (pp. 727-730).IEEE.
XX. Li, J., Li, B., Du, Z., &Meng, L. (2010, June). Cloudvo: Building a secure virtual organization for multiple clouds collaboration. In Software Engineering Artificial Intelligence Networking and Parallel/Distributed
Computing (SNPD), 2010 11th ACIS International Conference on (pp.181-186). IEEE.
XXI.Magiera, J., &Pawlak, A. (2005). Security Frameworks for virtual organizations.In Virtual Organizations
(pp. 133-148).Springer US.
XXII. Muthaiyah, S., &Kerschberg, L. (2007). Virtual organization security policies: An ontology-based integration approach. Information Systems Frontiers,9(5), 505-514.
XXIII. Phishing Attack. Retrieved from https://www.cloudflare.com/learning/security/threats/phishing-attack/
on December 8, 2018.
XXIV. Securing Virtual Applications and Servers. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-network-services-uns/white_paper_c11-652663.pdf on March 17
, 2016.
XXV. Sinnott, R. O., Chadwick, D. W., Doherty, T., Martin, D., Stell, A.,Stewart, G., …& Watt, J. (2008, May). Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security
models. In Cluster Computing and the Grid, 2008.CCGRID’08. 8th IEEE International Symposium on
(pp. 106-113). IEEE.
XXVI. Sniffing Networks Part 2 – MAC addresses, IP. Retrieved from http://securitymusings.com/article/tag/arp-spoofing on March 17, 2016.
View Download

Pairing-free Partially Blind Message Recovery Signature Scheme with Application To Online e-Cash Payment System

Authors:

Salome James, P. Vasudeva Reddy

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00036

Abstract:

Blind signature plays a significant role in practical applications such as ecash and e-voting systems, where anonymity is of great importance. A partially blind signature enables a signer to explicitly incorporate a pre-agreed common information into a blind signature without the loss of blindness property. In recent years, many cryptographic researchers have made substantial progress in the design of blind signature schemes. In order to improve the efficiency, in this paper, we propose a new pairing free partially blind signature scheme with message recovery in the identity-based frame work. The proposed scheme is existentially unforgeable with the assumption that the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard. We compare our scheme to the well known existing identity-based partially blind signature schemes. With pairing free realization and the message recovery features, the proposed scheme is more efficient in terms of computation and communication point of view. Finally, we present an electronic-cash payment system based on our PF-IDPBS-MR scheme.

Keywords:

Digital signatur,Partially Blind signatu,ECDL, ID-based Cryptography,Message Recovery,E-cash,

Refference:

I.Abe, E and Fujisaki. “How to Date Blind Signatures”. Asiacrypt’96, LNCS 1163, Springer-Verlag, pp 244-251 (1996).
II.Abe, M and Okamoto, T. “Provably secure partially blind signatures”.In: Proceedings of 20th Annual Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 20–24, 2000. Lecture Notes in
Computer Science, Springer, New York,Vol. 1880, pp 271–286 (2000).
III.Barreto, P; Kim, H.Y and Lynn, B. “Efficient Algorithms for Pairing based Cryptosystems”. LNCS, Springer-Verlag, Vol. 2442, pp 354–368 (2002).
IV.Cao, X; Kou, W and Du, X. “A Pairing –free Identity Based Authenticated Key Agreement Protocol with Minimal Message Exchanges”. Information Sciences, Vol. 180, No.15, pp 2895–2903 (2010).
V.Chaum, D. “Blind signatures for untraceable payments”. In Advances in Cryptology-Proceedings of CRYPTO’82, Springer-Verlag, New York, pp 199-203 (1983).
VI.Chen,W; Qin, B; Wu, Q; Zhang, L and Zhang, H. “ID-based partially blind signatures : A scalable solution to multi-bank e-cash, International conference on signal processing systems”. IEEE, DOI 10.1109/ICSPS.2009.121 (2009).
VII.Chow, S; Hui, L; Yiu, S and Chow, K. “ Two improved partially blind signature schemes from bilinear pairings”. In: Proceedings of 10th Australasian Conference on Information Security and Privacy, Brisbane,
Australia, Lecture Notes in Computer Science, Springer, New York, Vol. 3574 (2005).
VIII.Fan, C.I and Lei, C.L. “ Low-computation partially blind signatures for electronic cash”. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E81-A(5), pp 818–824 (1998).
IX.Hafizul Islam, S.K; Amin, R; Biswas, G.P; Obaidat, M.S and Khan, M.K. “Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System”. Arab J Sci Eng, Vol.41, No. 8, pp 3163-3176 (2016).
X.Hu, X and Huang, S. “An efficient ID-based partially blind signature scheme”. In software engineering, artificial intelligence, networking, and parallel/distributed computing, SNPD, IEEE, Eighth ACIS international
conference, pp 291-296 (2007).
XI.Koblitz, N. “Elliptic curve cryptosystem”. Journal of Mathematics of Computation, Vol. 48, No.177, pp 203-209 (1987).
XII.Li, F; Zhang, M and Takagi T. “Identity-based partially blind signature in the standard model for electronic cash”. Mathematical and Computer Modelling 58 pp 196–203 (2013).
XIII.Mahender Kumar and Katti, C.P. “An efficient ID-based partially blind signature scheme and application in electronic-cash payment system”.ACCENTS Transactions on Information Security, Vol. 2, No. 6, ISSN, pp
2455-7196 (2016).
XIV.Miller, V.S. “Use of elliptic curves in cryptography”. In Proceeding on Advances in cryptology-CRYPTO 85, Springer-Verlag, New York, LNCS,Vol. 218, pp 417-426 (1985).
XV.Nyberg, K and Rueppel, R.A. “A New Signature Scheme based on the DSA giving Message Recovery”. In Proc. of 1st ACM conference on communication and computer security, Virginia, USA, pp 58-61 (1993).
XVI.Paterson, K.G and Schuldt, J.C.N. “Efficient identity-based signatures secure in the standard model”. In: Information Security and Privacy—ACISP 2006,in: LNCS,Vol. 4058, Springer-Verlag, pp 207–222 (2006).
XVII.Pointcheval, D and Stern, J. “Security arguments for digital signatures and blind signatures”. Journal of Cryptology, Springer-Verlag, Vol.13, No.3, pp361-396 (2000).
XVIII.Shamir, A. “Identity-based Cryptosystems and Signature Schemes”. Crypto ’84, Springer-Verlag, LNCS Vol. 196, pp 47-53 (1985).
XIX.Shamus Software Ltd. Miracl Library. Available: http://certivox.org/display/EXT/MIRACL.
XX.Tahat, N. “A New Design Partially Blind Signature Scheme Based on Two Hard Mathematical Problems”.World Academy of Science, Engineering and Technology, International Journal of Mathematical and Computational Sciences Vol. 6, No. 8, (2012).
XXI.Tan, S.Y; Heng, S.H and Goi, B.M. “Java Implementation for Pairing-based Cryptosystems”. In: Taniar D., Gervasi O., Murganate B., Pardede E.,Apduhan B. O. (Eds.), Computational Science and its Applications- ICCSA- 2010, LNCS, Springer, Berlin, Heidelberg, 6019, pp 188-198 (2010).
XXII.Tian, X.X; Li, H. J; Xu, J.P and Wang Y. “A security enforcement ID-based partially blind signature scheme”. In International conference on web information systems and mining,IEEE, pp 488-92 (2009).
XXIII.Tseng, Y.M; Wu, T.Y and Wu, J.D. “Forgery attacks on an ID-based partially blind signature scheme”. International Journal of Computer Science. Vol. 35, No.3, pp 301-304 (2008).
XXIV.Wang, H and Zhang,Y. “A protocol for untraceable electronic cash”. In international conference on web-age information management, Springer Berlin Heidelberg, pp 189-197 (2000).
XXV.Wang, H; Zhang,Y and Cao, J. “An electronic cash scheme and its management”. Concurrent Engineering, Vol.12, No. 3, pp 247-257 (2004).
XXVI.Zhang, F; Safavi-Naini, R and Susilo, W. “Efficient verifiably encrypted signature and partially blind signature from bilinear pairings”. In: Proceedings of the 4th International Conference on Progress in Cryptology-INDOCRYPT, Springer, New York, Vol. 2904, pp 191–204 (2003).
XXVII.Zhang, X. “New randomized partially blind signature scheme”. International Conference on Computer Science and Electronic Technology (ICCSET2014).
XXVIII.Zhang, Y and Chen M. “The standard model enhanced ID based partially blind signature”. Journal of Sichuan University (Engineering Science Edition), Vol. 01, pp 95-101 (2014).
View Download

Comparison IFOC Scheme of Three Phase Optimal 63 Level Multilevel Inverter Connected Induction Motor using FLC and ANFIS

Authors:

Mr. Bolla Madhusudana Reddy, Y.V.Siva Reddy , M.Vijaya Kumar

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00037

Abstract:

This paper proposes initially an optimal structured single phase 63 level Multi level Inverter-(MLI) with Sinusoidal Pulse Modulation-(SPWM) and it can be extended to three phase 63 level MLI which is built with three individual single phase 63 level MLIs connected in star form and later it is fed to three phase star winding induction motor drive. The proposed MLI generates more number of levels with minimum switches, DC sources, low switching losses and reduced THD while compared with traditional MLIs. In the next subsequent case indirect field Oriented Control (IFOC) method is implemented through fuzzy Logic Controller-((FLC) of optimal 63 level MLI feeding induction motor(IM) drive for checking speed of motor, sudden load variation, parameters changes. Later the same method of AC drive tested with Adaptive Neuro Fuzzy Inference System (ANFIS) which gives better performance than AC drive with FLC. The proposed optimal MLI fed IM drive with IFOC gives improved performance using ANFIS in view of its high-quality dynamic performance and minimum THD.

Keywords:

MLI,FLC,ANFIS,IFOC,THD ,

Refference:

I.Ali saghafinia et.al. , “Adaptive fuzzy sliding mode control into chattering free IM drive”,IEEE trans., vol 51,no 1,Jan 2015.
II.Ataollah Makhberdonran et al., “Symmetrical and asymmetrical design of new cascaded multilevel inverter”, IEEE trans., vol 29,no 12,Dec 2014.
III.EiI Badsi et al., “DTC scheme for four switch inverter fed induction motor emulating six switch inverter”,IEEE trans., vol 28,no.7,Jul 2013.
IV.M.M Uddin, “Performances of fuzzy logic based indirect vector control for induction motor drive”,IEEE trans. Vol 38,no.5 Sept 2014.
V.M.Nasir uddin , “Development and implementation of simplified self tuned neuro fuzzy based IM drive”,IEEE trans.,vol 50,no1 Jan 2014.
VI.Mohammad fahadi kangarlu et al. “A generalized cascaded multilevel inverter using series connection of sub multilevel inverters”, IEEE trans. vol 28, no 2 Feb 2013.
VII.Mohamed S.Zaky et al., “A performance investigation of four switch three phase inverter fed IM drive at low speed using PI & FLC , IEEE trans. On Power Electronics , 2016.
VIII.Muvungu masiala, et al. “Fuzzy self tuning speed control of indirect field oriented control induction motor drive”, IEEE tran., vol44,no 6, Nov 2008.
IX.P.Ganesh et al., “Single phase 63 level modular multilevel inverter fed induction drive for solar PV applications”, IEEE explore, Aug 2018.
X.Yonsoo cho, et al. “Torque ripple reduction & fast torque response strategy for predictive torque
control of induction motor”, IEEE Trans. On Power Electronics, Jun 2017.
View Download

Face Recognition using Deep Neural Networks

Authors:

Amirhosein Dastgiri, Pouria Jafarinamin, Sami Kamarbaste, Mahdi Gholizade

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00038

Abstract:

Face recognition is one of the most important issues in the machine vision, which has many applications in the industry and other issues related to the vision of the machine. There are many algorithms in the field of machine learning to detect facial expressions. In recent years, deep neural networks are one of the areas of research. Because of its excellent performance, this technique is widely used in face recognition. Facial features are useful for a variety of tasks, and the application of deep neural network is very fast. In this paper, a method for recognition of facial expressions is presented using the features of the deep neural network. A deep neural network is used to summarize images and classify them. The proposed model focuses on identifying the faces of a person from a single image. The work algorithm is a multilayer neural network with a deep learning concept. The results show that in some cases, the recognition rate is very high.

Keywords:

face mode,deep neural network,deep learning,

Refference:

I.A. Kortylewski, B. Egger and A. Schneider.Empirically Analyzing the Effect of Dataset Biases on Deep Face Recognition Systems. Computer Vision and Pattern Recognition (CVPR), 2018.
II.Byeon YH, Kwak KC. Facial expression recognition using 3d convolutional neural network. Int J Adv Comput Sci Appl 5(12):107-112, 2014.
III.C. Benjamin and M. Ennio. Mitigation of effects of occlusion on object recognition with deep neural networks through low level image completion,”Computational Intelligence and Neuroscience, vol. 2016, Article ID 6425257, 15 pages, 2016.
IV.Chen, Xue-wen, Melih Aslan, Kunlei Zhang, and Thomas Huang.Learning multi-channel deep feature representations for face recognition”, In Feature Extraction: Modern Questions and Challenges, pp. 60-71, 2015.
V.Fakhari, Ali; Moghadam, Amir Masoud Eftekhari. Combination of classification and regression in decision tree for multi-labeling image annotation” Applied Soft Computing Volume 13 issue 2, 2013.
VI.Guosheng Hu and Xiaojiang Peng. Frankenstein: Learning deep face representations using small data”, IEEE Transactions on Image Processing, 2017.
VII.H.Xiong, S.Szedmak and J. Piater, “ Scalable, Accurate Image Annotation with Joint SVMs and Output Kernels, Neurocomputing”, Vol., No. 2015.
VIII.Hansen, M. F. , Smith, M. , Smith, L. , Salter, M. , Baxter, E. , Farish, M. and Grieve, B. and AB Agri, SRUC, Manchester University, Towards on-farm pig face recognition using convolutional neural networks.
Computers in Industry,98. pp. 145-152. ISSN 0166-3615 Available from: http://eprints.uwe.ac.uk/35276, 2018.
IX.J. Zeng, X. Zhao, Q. Chuanbo et al. Single sample per person face recognition based on deep convolutional neural network,” in Proceedings of IEEE International Conference on Computer and Communications (ICCC), pp. 1647–1651, Chengdu, China, December, 2017.
X.J. Zeng, X. Zhao, Y. Zhai, J. Gan, Z. Lin, and C. Qin. A novel expanding sample method for single training sample face recognition,” in Proceedings of International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 33–37, Ningbo, China, , 2017.
XI.Jing Zhang, Yaxin Zhao, Da Li, Zhihua Chen, and Yubo Yuan. A novel image annotation model based on content representation with multi-layer segmentation.Neural Comput. Appl. 26, 6,1407-1422.
DOI=http://dx.doi.org/10.1007/s00521-014-1815-6,. 2015.
XII.Jing Zhang• Yaxin Zhao• Da Li “A novel image annotation model based on content representation with multi-layer segmentation” The Natural Computing Applications Forum, 2015.
XIII.Jiwei Hu; Kin-Man Lam “An efficient two-stage framework for image annotation” Pattern Recognition Volume 46 issue 3, 2013.
XIV.K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
XV.L.Agapito et al. “Mixing Low-Level and Semantic Features for Image Interpretation A Framework and a Simple Case Study”: ECCV 2014 Workshops, Part II, LNCS 8926, pp. 283–298.DOI: 10.1007/978-3-319-16181-520, 2015.
XVI.M.Saraswathi and S. Sivakumari.Evaluation of PCA and LDA techniques for Face recognition using ORL face database”, (IJCSIT) International Journal of Computer Science and Information Technologies, Volume 6 (1), 2015, pp. 810-813, 2015.
XVII.Nur Ateqah Binti Mat Kasim, Nur Hidayah Binti Abd Rahman, Zaidah Ibrahim, Nur Nabilah Abu Mangshor. Celebrity Face Recognition using Deep Learning. Indonesian Journal of Electrical Engineering and Computer Science.Vol. 12, No. 2, pp. 476~481, 2018.
XVIII.S. S. Farfade, M. J. Saberian, and L.-J. Li, “Multi-view face detection using deep convolutional neural networks ,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XIX.S. S. Farfade, M. J. Saberian, and L.-J. Li. Multi-view face detection using deep convolutional neural networks,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XX.Savath Saypadith and Supavadee Aramvith.Real-Time Multiple Face Recognition using Deep Learning on Embedded GPU System. Proceedings,APSIPA Annual Summit and Conference 201812-15 November, 2018.
XXI.Shraddha Arya and Arpit Agrawal.Face Recognitionwith Partial Face Recognition and Convolutional Neural Network. International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET)Volume 7, Issue 1, 2278–1323, 2018.
XXII.Y. Li, W. Shen, X. Shi, and Z. Zhang.Ensemble of randomized linear discriminant analysis for face recognition with single sample per person,” in Proceedings of IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1–8, Shanghai, 2013.
XXIII.Zhiming Qian, Ping Zhong, Jia Chen, Integrating Global and Local Visual Features with Semantic Hierarchies for Two-Level Image Annotation,Neurocomputing,http://dx.doi.org/10.1016/j.neucom. 07.094
, 2015.
View Download

Adopting Modern Energy Conservation Measures to Enhance Building Energy Efficiency

Authors:

M. Yousaf Ali Khan, Imran Abbas, Shahid Atiq, Sheeraz Ahmed, AmadUd Din, Muhammad Fahad

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00039

Abstract:

Energy efficiency has been an immense importance in worldwide particularly in large educational institutes which are often left unnoticed as a contributor to energy consumers in Pakistan. The institute budget for energy cost has assumed to be the major costs and minimizing the energy bill in a large institute has become a big challenge. The targeted actions can be used to minimize the electricity consumption. The savings on energy provides a chance to reinvest it for the institute. In this work, energy assessment of Government College of Technology (GCT) campus Bhakkar is done to identify potential energy savings and to enhance the awareness, responsiveness for energy conservation amongst the community of the campus. The data about the installed load is collected by visiting each department. This work explained in details of the power consumption of different electrical devices installed in the institute and energy usage by those devices for a month is analysed. The work showed that a significant energy savings up to 50 % is achieved if old electrical devices are replaced with latest Energy conserving devices. Many facts corresponding the ECM devices are also encoded in this work and payback time is computed for the devices. Few basic ECMs are recommended to be followed by the institute which is technically and economically more reasonable. The benefits of implementing the energy efficiency measures in buildings are substantial both in terms of energy savings and cost savings.

Keywords:

Energy Audit, Energy Conservation,Energy Conservation Measure(ECMs) ,

Refference:

I.C.P. Ahila, and W.J.J. Femi. “Energy audit in ladies hostel.” In TENCON -TENCON 2015 – 2015 IEEE Region 10 Conference.
II.D. Rathod, Deepak, R.Khandare, and A. K. Pandey. “Electrical Energy Audit (A Case Study OfTobbaco Industry).” International Journal of Engineering, 2013, Vol. No. 3, pp. 9-18.
III.G. Sultana, and H.U. Harsha. “Electrical Energy Audit a case study.” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 2015, Vol. 10, no. 3, pp 1-6.
IV.H. Singh, M. Seera, and M. A. M.Idin. “Electrical energy audit in a Malaysian university- A case study.” International Conference on Power and Energy (PECon), IEEE, 2012, pp. 616-619.
V.K.P. Amber, and N. Ashraf. “Energy outlook in Pakistan.” International Conference on Energy Systems and Policies (ICESP), IEEE, 2014.
VI.K.R.Shailesh, S. Tanuja, M. Kumar, and R.A. Krishna. “Energy consumption optimisation in classrooms using lighting energy audit.”National Conference on Challenges in Research & Technology in the Coming Decades (CRT 2013).
VII. M. Ahmad, M. Shafique, M. A. Aslam, M. N. Khan, and R. Y. Khan. “Personal energy independence a short-term solution for ongoing energy crisis in Pakistan using home solar grid.” International Conference on Energy Systems and Policies (ICESP),IEEE, 2014.
VIII.M. Kumar, P. H. Shaikh, F. Shaikh, and M. A.Uqailli. “Energy Conservation through Motors in Pakistan’s Industrial Sector-Need to use of Energy Efficient Motors.” International Journal of Computer Applications, 2012,
Vol. 54, No. 5.
IX.M. S. Isasare, and S. A. Zadey. “A case study: Energy audit at AVBRH, Sawangi (M), Wardha.” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT),IEEE, 2016.
X.N.M. Maricar, and M. H. Othman. “Energy audit application for building of small and medium enterprise.” Saudi InternationalElectronics,Communications and Photonics Conference (SIECPC), IEEE, 2013.
XI.S.A.R.Shah, M. M. Saleem, H. Rehman, and B. Khan. “The cost for economic growth: A study on the energy demand of Pakistan using TIMES.”, Power Generation System and Renewable Energy Technologies
(PGSRET),IEEE, 2015.
XII.S. N. Chaphekar, R. A.Mohite, and A. A. Dharme. “Energy monitoring by energy audit and supply side management.”International Conference on Energy Systems and Applications , IEEE 2015.
XIII.S.P. Parthe, and S.Kompeli. “Energy Audit and Conservation Tool for Energy Efficiency.” International Research Journal Engineering and Technology (IRJET) 2015, Vol.2,No.8, pp 747-751.
XIV.T. Fiedler and P.M. Mircea. “Energy Management systems according to the ISO 50001 standard, Challenges and benefits.” International Conference on Applied and Theoretical Electricity (ICATE), IEEE, 2012.
View Download

Fostering Conditions for Innovative Reforms in Public Sector Organizations and Their Response to Artificial Intelligence

Authors:

Sayyed Khawar Abbas, Muhammad Aftab

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00040

Abstract:

The paper is intended to investigate the foster effects of political instability, leadership influence, experimentation and budget constraints responsible for poor performance and feedback from public sector organizations. Keeping in view the purpose of the study, the research framework for the study is descriptive. Firstly, Primary data is collected through questionnaires from individuals engaged with public sector organizations. Secondly, unstructured interviews conducted to explore the effect of Artificial intelligence. Through research analysis, the empirical evidence suggest that the innovation activity is intrigued with important conditions responsible for the performance of public sector organization. Political instability suggested negative significance while others have demonstrated positive significance concerning innovation reforms. Artificial Intelligence also demonstrates a strong scope for future public sector organizations. In the following research framework, the data is based on the judgments of employees engaged with public sector organizations. The responses are individual self-reported and not objective, so there is a fair possibility that response would be biased. Furthermore, the responses are from Pakistan’s main cities which cannot be generalized to various countries. This study focuses on the performance of the public sector organization. A large amount of literature has emerged on the likelihood of innovation reforms for private sector firms over the course of time. This paper is widening the horizon to study the likelihood of innovation reforms for public sector organizations by adhering the innovation culture and identifying important factors which may influence. The paper also provides a base for finding more dimensions to implement innovation reforms and also guide policymakers to execute efficient policies. Furthermore, the study is based on questions covering “what” and “how” dimensions. This type of quantitative study lacks for “why” dimension. Therefore, semi-structured interviews and case analysis could explain more regarding innovation reforms. The research framework is the first attempt to examine the impact of different conditions on the implementation of innovation and Artificial intelligence influence in public sector organizations in Pakistan.

Keywords:

Public sector organizations, Innovation reforms, political instability,leadership influence, experimentation, budget constraints, OECD (Organization for Economic Cooperation and Development, ICT (Information and communication technology),Artificial Intelligence,

Refference:

I.Albury, D. (2005). Fostering innovation in public services.Public money and management, 25(1), 51-56.
II.Anthony, A., & Dorothea, H. (2013). From too little to too much innovation?Issues in measuring innovation in the public sector. Structural Change and Economic Dynamics, 27, 27(C), 146-159.
III.Arfeen , M. I., & Khan , P. N. (2009). Public Sector Innovation: Case study of e-government projects in Pakistan.The Pakistan Development Review,439-457.
IV.Arundel , A., Casali, L., & Hollanders, H. (2015). How European public sector agencies innovate: The use of bottom-up,policy-dependent and knowledge-scanning innovation methods.Research Policy, 44(7), 1271-1282.
V.Audretsch, D., & Demircioglu, M. (2017). Conditions for innovation in public sector organizations.Research Policy, 46(9), 1681-1691.
VI.Bommert, B. (2010). “Collaborative innovation in the public sector”.International Public Management Review
, 11(1),15-33.
VII.Bugge, M. M., & Bloch, C. (2016). Between bricolage and breakthroughs—framing the many faces of public sector innovation.Public Money & Management, 36(4), 281-288.
VIII.Butt, F. S., Rafique, T., Nawab, S., Khan, N. A., & Raza, A. (2013). Organizational Transformation in Public Sector Organizations of Pakistan in the Quest of Change Management.Research Journal of Applied Sciences,
Engineering and Technology, 6(16): 3086-3093.
IX.Chesbrough, H. (2003). “The logic of open innovation: managing intellectual property”. California Management Review, 45(3), 33-58.
X.Demircioglu, M. A. (2017). Conditions for innovation in public sector organizations. Research Policy
, 46(9), 1681-1691.
XI.Gallup Organization. (2011).Analytical Report – Innovation in Public Administration: Report.Gallup Organization.
XII.Gassmann, O. (2006). “Opening up the innovation process: towards an agenda”.R&D Management
, 36(3), 223-8.
XIII.Goodman, J. (2016). Robots in Law: How Artificial Intelligence is Transforming Legal Services.
Ark Group. ISBN 978-1-78358-264-8.
XIV.Iqbal, M. Z., Rehan, M., Fatima, A., & Nawab, S. (2017). The Impact of Organizational Justice on Employee Performance in Public Sector Organization of Pakistan.International Journal of Economics &
Management Sciences, (6)3, 1-6.
XV.Koch, P., & Hauknes, J. (2005). On innovation in the public sector – today and beyond. Oslo: Publin.
XVI.Lee, S. M., Hwang, T., & Choi, D. (2012). Lee, S. M., Hwang, T., & Choi, D. (2012). Open innovation in the public sector of leading countries.Management decision,. Management Decision, 50(1), 147-162.
XVII.Lopez, V., & Whitehead, D. (2013). Sampling data and data collection inqualitative research.Nursing and Midwifery Research: Methods and Critical Appraisal for Evidence-based Practice, 124-140.
XVIII.Luc, B., & Hafsi, T. (2007). The changing nature of public entrepreneurship. 67(3), 488-503.: Public Administration Review,.
XIX.Maranville, S. (1992). “Entrepreneurship in the Business Curriculum”. Journal of Education for Business.
, 68(1), 27–31.
XX.Ng, A. (2017, September 22). IBM’s Watson gives proper diagnosis after doctors were stumped. Newyork: NY Daily News.
XXI.OECD. (2014). Innovating the Public Sector: from Ideas to Impact. OECD Conference Centre, Paris
(pp. 1-40). Paris: OECD Conference Centre, Paris.
XXII.Palmer , C., & Kaderdina , F. (2017). Public sector innovation: From ideas to actions. UK: Ernst & Young Global Limited.
XXIII.Russell, S. J., & Norvig, P. (2009). Artificial Intelligence: A Modern Approach. Upper Saddle River, New Jersey: Prentice Hall. ISBN 0-13-604259-7.
XXIV.Sahni, N. R., Wessel, M., & Chr, C. M. (2013). Unleashing breakthrough innovation in government.
Stanford Soc. Innovation Rev, 11(3), 27-31.
XXV.Schweitzer, J. (. (2014). Leadership and innovation capability development in strategic alliances.
Leadership & Organization Development Journal, 35(5),442-469.
XXVI.Smith, S. (2013). Fundamentals of marketing research.Thousand Oaks, CA:SAGE Publications.
XXVII.Torugsa, N., & Arundel, A. (2017). Rethinking the effect of risk aversion on the benefits of service innovations in public administration agencies.Research Policy, (5), 900-910.
XXVIII.UNDP Pakistan. (2018, February). Governance Reforms and Innovation. Retrieved from SUSTAINABLE DEVELOPMENT GOALS: United Nations Development Programme:http://www.pk.undp.org/content/pakistan/en/home/operations/projects/democ ratic_governance/governance-reforms-and-innovation-.html
XXIX.Wynen Jan, Verhoest, K., Ongaro, E., & Thie, S. V. (2014). Innovation-oriented culture in the public sector: Do managerial autonomy and result control lead to innovation?Public Management Review
, 16(1), 45-66
View Download