Статьи журнала - International Journal of Information Technology and Computer Science

Все статьи: 1165

Towards data resilience: the analytical case of crypto ransomware data recovery techniques

Towards data resilience: the analytical case of crypto ransomware data recovery techniques

Aaron Zimba, Zhaoshun Wang, Luckson Simukonda

Статья научная

Crypto ransomware has earned an infamous reputation in the malware landscape and its sound sends a lot of shivers to many despite being a new entrant. The media has not helped matters even as the myths and inaccuracies surrounding crypto ransomware continue to deepen. It’s been purported that once crypto ransomware attacks, the victim is left with no option but to pay in order to retrieve the encrypted data, and that without a guarantee, or risk losing the data forever. Security researchers are inadvertently thrown into a cat-and-mouse chase to catch up with the latest vices of the aforesaid in order to provide data resilience. In this paper, we debunk the myths surrounding loss of data via a crypto ransomware attack. Using a variety of crypto ransomware samples, we employ reverse engineering and dynamic analysis to evaluate the underlying attack structures and data deletion techniques employed by the ransomware. Further, we expose the data deletion techniques used by ransomware to prevent data recovery and suggest how such could be countered. From the results, we further present observed sandbox evasion techniques employed by ransomware against both static and dynamic analysis in an effort to obfuscate its operations and subsequently prevent data recovery. Our analyses have led us to the conclusion that no matter how devastating a crypto ransomware attack might appear, the key to data recovery options lies in the underlying attack structure and the implemented data deletion methodology.

Бесплатно

Towards enhancing access of HIV/AIDS healthcare information in Tanzania: is a mobile application platform a way forward?

Towards enhancing access of HIV/AIDS healthcare information in Tanzania: is a mobile application platform a way forward?

Ibrahim A. Mwammenywa, Shubi F. Kaijage

Статья научная

This survey study evaluates the peoples’ acceptance and comfortability on accessing the HIV/AIDS healthcare information through visiting HIV/AIDS Care and Treatment Centers (CTCs). Furthermore, the survey examines whether a mobile application platform can be the way forward towards enhancing HIV/AIDS healthcare information delivery in Tanzania. This study was conducted in Dar es Salaam city in Tanzania. The structured questionnaire-based survey was carried-out involving a total of 208 respondents, among them, 45 were the HIV/AIDS healthcare practitioners. The collected data were analyzed by using WEKA and Python computer programming software. The study findings indicated that: 24.5% of the respondents claimed that they were not comfortable going to HIV/AIDS CTCs indicating that they were afraid of being exposed and stigmatized; almost one-third (31.3%) of respondents prefer to seek HIV/AIDS related information from online sources; 78.5% of respondents preferred to have an official mobile application for access the HIV/AIDS healthcare information; 64.4% of HIV/AIDS practitioners indicated the need of having a mobile application platform for HIV/AIDS healthcare information delivery; and more than two-third of HIV/AIDS practitioners claimed to be able to serve people with HIV/AIDS healthcare information online. It is concluded that there is a need for the HIV/AIDS healthcare providers to have a mobile application platform for HIV/AIDS healthcare information delivery. The mobile application platform will consequently help people to confidentially access the HIV/AIDS healthcare information in their mobile electronic gadgets frequently without fear of being exposed as if they would frequently visit CTCs.

Бесплатно

Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks

Tracking Area Boundary-aware Protocol for Pseudo Stochastic Mobility Prediction in LTE Networks

Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony J. Rodrigues

Статья научная

Accurate mobility prediction enables efficient and faster paging services in these networks. This in turn facilitates the attainment of higher bandwidths and execution of activities such as handovers at low latencies. The conventional mobility prediction models operate on unrealistic assumptions that make them unsuitable for cellular network mobile station tracking. For instance, the Feynman-Verlet, first order kinetic model and Random Waypoint assume that mobile phones move with constant velocity while Manhattan, Freeway, city area, street unit, obstacle mobility, and pathway mobility postulate that mobile station movement is restricted along certain paths. In addition, obstacle mobility model speculate that the mobile station signal is completely absorbed by an obstacle while random walk, random waypoint, Markovian random walk, random direction, shortest path model, normal walk, and smooth random assume that a mobile station can move in any direction. Moreover, the greatest challenge of the random direction model is the requirement that a border behavior model be specified for the reaction of mobile stations reaching the simulation area boundary. In this paper, a protocol that addresses the border behavior problem is developed. This protocol is shown to detect when the subscriber has moved out of the current tracking area, which is crucial during handovers.

Бесплатно

Traffic Accident Analysis Using Decision Trees and Neural Networks

Traffic Accident Analysis Using Decision Trees and Neural Networks

Olutayo V.A, Eludire A.A

Статья научная

This work employed Artificial Neural Networks and Decision Trees data analysis techniques to discover new knowledge from historical data about accidents in one of Nigeria’s busiest roads in order to reduce carnage on our highways. Data of accidents records on the first 40 kilometres from Ibadan to Lagos were collected from Nigeria Road Safety Corps. The data were organized into continuous and categorical data. The continuous data were analysed using Artificial Neural Networks technique and the categorical data were also analysed using Decision Trees technique .Sensitivity analysis was performed and irrelevant inputs were eliminated. The performance measures used to determine the performance of the techniques include Mean Absolute Error (MAE), Confusion Matrix, Accuracy Rate, True Positive, False Positive and Percentage correctly classified instances. Experimental results reveal that, between the machines learning paradigms considered, Decision Tree approach outperformed the Artificial Neural Network with a lower error rate and higher accuracy rate. Our research analysis also shows that, the three most important causes of accident are Tyre burst, loss of control and over speeding.

Бесплатно

Traffic Sign Detection and Recognition Model Using Support Vector Machine and Histogram of Oriented Gradient

Traffic Sign Detection and Recognition Model Using Support Vector Machine and Histogram of Oriented Gradient

Nabil Ahmed, Sifat Rabbi, Tazmilur Rahman, Rubel Mia, Masudur Rahman

Статья научная

Traffic signs are symbols erected on the sides of roads that convey the road instructions to its users. These signs are essential in conveying the instructions related to the movement of traffic in the streets. Automation of driving is essential for efficient navigation free of human errors, which could otherwise lead to accidents and disorganized movement of vehicles in the streets. Traffic sign detection systems provide an important contribution to automation of driving, by helping in efficient navigation through relaying traffic sign instructions to the system users. However, most of the existing techniques have proposed approaches that are mostly capable of detection through static images only. Moreover, to the best of the author’s knowledge, there exists no approach that uses video frames. Therefore, this article proposes a unique automated approach for detection and recognition of Bangladeshi traffic signs from the video frames using Support Vector Machine and Histogram of Oriented Gradient. This system would be immensely useful in the implementation of automated driving systems in Bangladeshi streets. By detecting and recognizing the traffic signs in the streets, the automated driving systems in Bangladesh will be able to effectively navigate the streets. This approach classifies the Bangladeshi traffic signs using Support Vector Machine classifier on the basis of Histogram of Oriented Gradient property. Through image processing techniques such as binarization, contour detection and identifying similarity to circle etc., this article also proposes the actual detection mechanism of traffic signs from the video frames. The proposed approach detects and recognizes traffic signs with 100% precision, 95.83% recall and 96.15% accuracy after running it on 78 Bangladeshi traffic sign videos, which comprise 6 different kinds of Bangladeshi traffic signs. In addition, a public dataset for Bangladeshi traffic signs has been created that can be used for other research purposes.

Бесплатно

Transient Process at Atmospheric Discharge into the Landline and the Appearance of an Electric Arc in the Switch

Transient Process at Atmospheric Discharge into the Landline and the Appearance of an Electric Arc in the Switch

Slobodan N. Bjelić, Filip N. Marković, Nenad A. Marković

Статья научная

This document proposes a model of the process of atmospheric discharge of overhead lines followed by an electric arc. The intensity of atmospheric discharges, followed by electric arc and destruction, is determined by the difference in potential and current. Such a structure and form of discharge make it difficult to analyze the transient process and obtain adequate solutions. That is why the model of the transient process in the electric arc of the switch under the conditions of interruption of the AC circuit is specially analyzed. Simple equivalent schemes for the analysis of phenomena with given values of linear parameters are presented, which are very simple to apply. All influential parameters by which the overvoltage values in the model can be estimated were also taken into account. The evaluation of the proposed model was performed using the adapted MATLAB program psbsurlightcuurent for atmospheric electrical discharge, which contains a high frequency current source. The verified simulation method was used to verify the results as part of a method derived from artificial intelligence algorithms. The process simulation program, the obtained voltage and current diagrams confirm the application of the simulation algorithm model.

Бесплатно

Transient Processes on the Elements of Underground Installations

Transient Processes on the Elements of Underground Installations

Bojan L. Jovanović, Slobodan N. Bjelić, Nenad A. Marković

Статья научная

If the value of the field is greater than the disruptive voltage of the soil around earth wire (probe) the breakthrough occurs and the majority of soil becomes conductive. Particular problem are components of high frequency currents or voltages. Disorders of frequency in the range of 50 Hz to 5 kHz that can affect the selection of installation parameters, in compliance with all environmental criteria, are simulated by adapted subprogram in the part of the package Sym Power MATLAB.

Бесплатно

Tree Adapt: Web Content Adaptation for Mobile Devices

Tree Adapt: Web Content Adaptation for Mobile Devices

Rajibul Anam, Chin Kuan Ho, Tek Yong Lim

Статья научная

Mobile web browsing usually becomes time-consuming since currently it requires horizontal and vertical scrolling in addition to this, users interested in only a section of a web page are often burdened with cumbersome whole web pages that not only do not properly fit their mobile screens but also require a lot of delivery time. This problem can be addressed and resolved with the help of a mobile web content adaptation system. Existing web content adaptation systems focus on resizing contents to fit a mobile device and removing unnecessary contents from the adapted web page. This paper’s aim is to address the gap by proposing the TreeAdapt which provides a condensed view of an adapted web page. This condensed view consists of only block headers which users can then expand for complete content. In order to achieve this, the proposed algorithm will first categorize an HTML object as menu, block title or the main content. A depth-first traversal algorithm is then used to select the sequence of blocks to be displayed on a mobile device. Usability studies were performed to evaluate the usability of the adapted contents against other deployed systems. Results from the usability studies indicate that the adapted contents produced by the proposed techniques enabled users to locate targeted information within a web page in a shorter span of time.

Бесплатно

Trends, Issues and Challenges Concerning Spam Mails

Trends, Issues and Challenges Concerning Spam Mails

Jitendra Nath Shrivastava, Maringanti Hima Bindu

Статья научная

Traditional correspondence system has now been replaced by internet, which has now become indispensable in everyone’s life. With the advent of the internet, majority of people correspond through emails several times in a day. However, as internet has evolved, email is being exploited by spammers so as to disturb the recipients’. The entire internet community pays the price, every time there pops a spam mail. Online privacy of the users is compromised when spam disturbs a network by crashing mail servers and filling up hard disks. Servers classified as spam sites are forfeited from sending mails to the recipients’. This paper gives the broader view of spam, issues challenges and statistical losses occurred on account of spams.

Бесплатно

Trust Formulization in Dynamic Source Routing Protocol Using SVM

Trust Formulization in Dynamic Source Routing Protocol Using SVM

Priya Kautoo, Piyush Kumar Shukla, Sanjay Silakari

Статья научная

In an advanced wireless network, trust is desirable for all routing protocols to secure data transmission. An enormous volume of important information communicates over the wireless network using trusted dynamic routing protocol, which is the enhancement of the DSR (Dynamic Source Routing) protocol to improve trust. Previously fuzzy logic, genetic algorithm, neural network has been used to modify DSR and good result has been obtained in few performance indicators and parameters. In this work an SVM based trusted DSR have been developed and better results have been presented. This new novel on demand trust based routing protocol for MANET is termed as Support vector machine based Trusted Dynamic Source Routing protocol, performance of STDSR has been improved in term of the detection ratio (%) at different mobility and no. of malicious node variation.

Бесплатно

Trusted Mobile Client for Document Security in Mobile Office Automation

Trusted Mobile Client for Document Security in Mobile Office Automation

Xiaojun Yu, Qiaoyan Wen

Статья научная

Mobile Office Automation is a popular application on the mobile platform. However, the mobile platform has no enough security protection in front of the open system, such as internet. The document security problem in this application has become a hot topic. This paper proposed a new solution to this problem. The solution based on the trusted computing technology, which implements the platform security by hardware. The solution also includes the transparent encryption technology that means application could run independent to the security module and keep the consistency of user experience. The trusted mobile client platform architecture and security functions process of the mobile document protection system are detailed. Related work also been introduced; the security analysis shows the proposed solution could provide well security enhancement for document protection in mobile platform.

Бесплатно

Tuning stacked auto-encoders for energy consumption prediction: a case study

Tuning stacked auto-encoders for energy consumption prediction: a case study

Muhammed Maruf Öztürk

Статья научная

Energy is a requirement for electronic devices. A processor is a substantial part of computer components in terms of energy consumption. A great concern has risen over recent years about computers with regard to the energy consumption. Taking accurate information about energy consumption of a processor allows us to predict energy flow features. However, using traditional classifiers may not enhance the accuracy of the prediction of energy consumption. Deep learning shows great promise for predicting energy consumption of a processor. Stacked auto-encoders has emerged a robust type of deep learning. This work investigates the effects of tuning stacked auto-encoder in computer processor with regard to the energy consumption. To search parameter space, a grid search based training method is adopted. To prepare data to prediction, a data preprocessing algorithm is also proposed. According to the obtained results, on average, the method provides 0.2% accuracy improvement along with a remarkable success in reducing parameter tuning error. Further, in receiver operating curve analysis, tuned stacked auto-encoder was able to increase value of are under the curve up to 0.5.

Бесплатно

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Twitter as a Social Network in Academic Environments for Exchanging Information Taibah University: A Case Study

Zohair Malki

Статья научная

Twitter is extensively used in the Arab World in the last few years. It showed positive impact on both students and teachers in academic institutions. In this paper we introduce Taibah University as a case study to examine Twitter uses and benefits in education environments. Deans, Students and Teachers accounts on Twitter will be examined to discover the general uses of Twitter and the type of information which is commuting between students and teachers. Results showed that twitter is used extensively in Taibah University for after class room discussions, and for the teachers to share class notes and lectures, in addition it showed highly agreement on the importance of twitter in Taibah University from both students and faculty members.

Бесплатно

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Two Fold Optimization of Precopy Based Virtual Machine Live Migration

Sangeeta Sharma, Meenu Chawla

Статья научная

Virtualization is widely adopted by the data centers, in order to fulfill the high demand for resources and for their proper utilization. For system management in these virtualized data centers virtual machine live migration acts as a key method. It provides significant benefit of load-balancing without service disruption. Along with the various benefits virtual machine live migration also imposes performance overhead in terms of computation, space and bandwidth used. This paper analyzes the widely used precopy method for virtual machine live migration and proposes the two fold optimization of precopy method for virtual machine live migration. In the first phase, the proposed two fold precopy method reduces the amount of data sent in first iteration of precopy method. Second phase restricts sending of similar data iteratively in each subsequent iterations of precopy method by identifying frequently updated pages and keeps it till the last stop and copy iteration. In this way it reduces total migration time and total amount of data transferred. The proposed two fold precopy method is compared with precopy method and simulation results show the performance improvement of a virtual machine live migration in terms of total migration time and total amount of data transferred.

Бесплатно

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Two Group Signature Schemes with Multiple Strategies Based on Bilinear Pairings

Jianhua Zhu, Guohua Cui, Shiyang Zhou

Статья научная

A group signature scheme and a threshold group signature scheme based on Bilinear Paring are proposed, there are multiple security strategies in these two schemes. These schemes have forward security which minimizes the damage caused by the exposure of any group member's signing key, and does not affect the past signatures generated by this member; meanwhile, ahead signature generated by a group member before the joining date can be prevented via this strategy. Moreover, this scheme support the group member revocable function efficiently and further has no requirement for time period limits.

Бесплатно

Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Two SAOR Iterative Formats for Solving Linear Complementarity Problems

Xian-li Han, Dong-jin Yuan, Shan Jiang

Статья научная

In this paper, we propose two new iterative SAOR methods to solve the linear complementarity problem. Some sufficient conditions for the convergence of two new iterative methods are presented, when the system matrix M is an M-matrix. Moreover, when M is an L-matrix, we discuss the monotone convergence of the new methods. And in the numerical experiments we report some computational results with the two proposed SAOR formats.

Бесплатно

Typology for Linguistic Pattern in English-Hindi Journalistic Text Reuse

Typology for Linguistic Pattern in English-Hindi Journalistic Text Reuse

Aarti Kumar, Sujoy Das

Статья научная

Linking and tracking news stories covering the same events written in different languages is a challenging task. In natural languages same information may be expressed in multiple ways and newspapers try to exploit this feature for making the news stories more appealing. It has been observed that the same news story is presented in same as well as in different language in different ways but normally the gist remains the same. Diversity of linguistic expressions presents a major challenge in identifying and tracking news stories covering the same events across languages, but doing so may provide rich and valuable resources as comparable and parallel corpora can be generated with this resource. In the case of Indian languages there exist limited language resources for Natural Language Processing and Information Retrieval tasks and identifying comparable and parallel documents would offer a potential source for deriving bilingual dictionaries and training statistical Machine Translation systems. Paraphrasing is the most common way of reproducing news stories and translated text is also a type of paraphrase. Prior to linking monolingual or bilingual news stories, these paraphrase types need to identified and classified to help researchers to devise techniques to solve these challenging problems. English-Hindi language pair not only differs in their scripts but also in their grammar and vocabulary. A number of paraphrase typologies have been built from the perspective of Natural Language Processing or for some or the other specific applications but as per the knowledge of the authors, no typology have been reported for English-Hindi cross language text reuse. In this paper a typology is formulated for cross lingual journalistic text reuse in English-Hindi. Typology unravels level of difficulties in English-Hindi mapping. It shall help in devising techniques for linking and tracking English-Hindi stories.

Бесплатно

Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering

Ultrasound Image Despeckling using Local Binary Pattern Weighted Linear Filtering

Simily Joseph, Kannan Balakrishnan, M.R. Balachandran Nair, Reji Rajan Varghese

Статья научная

Speckle noise formed as a result of the coherent nature of ultrasound imaging affects the lesion detectability. We have proposed a new weighted linear filtering approach using Local Binary Patterns (LBP) for reducing the speckle noise in ultrasound images. The new filter achieves good results in reducing the noise without affecting the image content. The performance of the proposed filter has been compared with some of the commonly used denoising filters. The proposed filter outperforms the existing filters in terms of quantitative analysis and in edge preservation. The experimental analysis is done using various ultrasound images.

Бесплатно

Under Water Optical Wireless Communications Technology for Short and Very Short Ranges

Under Water Optical Wireless Communications Technology for Short and Very Short Ranges

Abd El–Naser A. Mohamed, Ahmed Nabih Zaki Rashed, Amina E. M. El-Nabawy

Статья научная

This paper has presented our interest in wireless underwater optical communications. Recent interest in ocean exploration has brought about a desire for developing wireless communication techniques in this challenging environment. Due to its high attenuation in water, a radio frequency (RF) carrier is not the optimum choice. Acoustic techniques have made tremendous progress in establishing wireless underwater links, but they are ultimately limited in bandwidth. In traditional communication systems, constructing a link budget is often relatively straight forward. In the case of underwater optical systems the variations in the optical properties of sea water lead to interesting problems when considering the feasibility and reliability of underwater optical links. The main focus of this paper is to construct an underwater link budget which includes the effects of scattering and absorption of realistic sea water. As well as we have developed the underwater optical wireless communication systems to have shorter ranges, that can provide higher bandwidth (up to several hundred Mbit/sec) communications by the assistant of exciting high brightness blue LED sources, and laser diodes suggest that high speed optical links can be viable for short range application.

Бесплатно

Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

Unifying the Access Control Mechanism for the Enterprises Using XACML Policy Levels

N. Senthil Kumar, Anthoniraj Amalanathan

Статья научная

Many enterprises have intended to promote their applications with stern access control mechanism and yield the stringent authorization deployment in their individual proprietary manner. The development of this build up will result in tight coupling of authorization mechanisms within the enterprise applications. In many enterprises setup, the implicit authorization processes are embedded within the application and promote error prone accessing of requested policies. This sort of embedded authorization will let the users to carry out the specific actions without knowing the access control policy as well as its embedded setup with the help of third party involvement. But this approach has some serious effects in controlling the issues such as skipping the trust based applications, violates the policy setups and pave the way to exploit the authorized data to the end users. Many enterprises had faced serious problem in controlling its sensitive data from this implicit authorization decisions and hence decided to develop a security mechanism which can be totally controlled by centralized way of access policy. Therefore, the eXtensible Access Control Markup Language (XACML) provides a very simple and powerful remedy for authorization mechanism and for the access policy set ups.

Бесплатно

Журнал