Series-1 (Nov.-Dec. 2020)Nov.-Dec. 2020 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Paper
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Risk-driven Security Policy Enforcement: An Evidential Model |
Country | : | USA |
Authors | : | Bel G. Raggad || Abhi Pandya |
: | 10.9790/2834-1506010112 |
Abstract: We propose a risk-driven security policy enforcement model using Dempster and Shafer's calculus of evidence. We define security policy, as in [15], to be the acceptable behavior of a system as defined by its owners. We assume information security management to have a corporate security policy made of auditable rules for which we apply security-monitoring sensors to detect violations of the security policy. We adopt security objectives and features on which security policy is structured and monitored using security sensors configured to generate raw data translated into belief structures needed to manage model uncertainty. Belief structures are shaped using a tuned membership function that accounts for two generic types of evidence, favorable to corporate security.....
Keywords: Security policy, security features, layer-based, policy enforcement, Dempster and Shafer theory, evidence calculus, belief functions, basic belief assignment, security risk.
[1]. Aguirre et al., (2013), Construction of Belief Functions From Statistical Data About Reliability Under Epistemic Uncertainty, IEEE Transactions on Reliability, 62(3).
[2]. Aickelin et al., (2007), Rule generalization in intrusion detection systems using SNORT, Int. J. Electronic Security and Digital Forensics, 1(1).
[3]. AlKalbani et al., (2017), Information Security Compliance in Organizations: An Institutional Perspective, Data and Information Management, 1(2), 104-114.
[4]. Cram et al., (2017), Organizational information security policies: a review and research framework, European Journal of Information Systems, 26(6), 605-641.
[5]. Dempster, A. P. (1969). Upper and lower probability inferences for families of hypotheses with monotone density ratios. Ann. Math. Statist. 40(3), 953–969.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | The effective impact of Smart tourism on activities in Smart Cities : A Review |
Country | : | Malaysia |
Authors | : | Jamilah Osama Rashid |
: | 10.9790/2834-1506011320 |
Abstract: This article aims to analyse Sharia Compliant tourism locations in Smart City (Kuala Lumpur). Sharia Compliant (Halal) tourism has recently increased dramatically , is characterised by quality , intelligent organisation and good experience in the field of hospitality. It combines stnediser lacol rof seitivitca , srotisiv seirtnuoc tnereffid morf , fo noitulove eht no stcelfer services in host countries and is part of the service provided to the countrymen. It is a growing element in most vital seasons and various celebrations. Therefore , tourist services should be organised , equipped to suit the citizens and attract visitors from most countries in the world ¹. Tourism is one of the industries that grows efficiently and stneserper4 %of the growth in world output ². Materials and Methods:The design of this thesis is appropriate for the mixed method because it rof swolla delaever eb ot ngised siseht, rennam deliated dna etarucca na ni denialpxe. sihT study clarifies the method used in the amount of research methodology to address slaog and objective research. Quantitative methods are the primary axis that determines the derusaem si ti erofeb nonemonehp ralucitrap a fo stcepsa suoirav³. Results: The In this respect, Malaysian ruotism has deviecer great attention as it has witnessed a remarkable smret ni tnempoleved of quantity and ytilauq. ni dedeeccus yllareneg sah aisyalaM drawing the attention and attracting smilsuM fo to tourisms ,especially tourists from lddiM ehte East, by offering a letoh industry of Sharia tnailpmoc........
Keywords: Sharia Compliant; Smart City; Geographical Information Systems (GIS); Tourism service and Information and communication technology (ICT).
[1]. Uysal, Muzaffer, et al. "Quality of life (QOL) and well-being research in tourism." Tourism Management 53 (2016): 244-261
[2]. Lenzen, M., Sun, Y. Y., Faturay, F., Ting, Y. P., Geschke, A., & Malik, A. (2018). The carbon footprint of global tourism. Nature Climate Change, 8(6), 522
[3]. Blaikie, P. M. (2009). The tsunami of 2004 in Sri Lanka: an introduction to impacts and policy in the shadow of civil war. NorskGeografiskTidsskrift-Norwegian Journal of Geography, 63(1), 2-9.
[4]. Samori, Z., &Sabtu, N. (2014). Developing halal standard for Malaysian hotel industry: An exploratory study. Procedia-Social and Behavioral Sciences, 121, 144-157
[5]. Dali, N. M., Abdullah, A., & Islam, R. (2018). Prioritization Of The Indicators And Sub-Indicators Of Maqasid Al-Shariah In Measuring Liveability Of Cities.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | AAM and LC for Face Recognition |
Country | : | India |
Authors | : | Dr. Mahesh Prasanna K || Dr. Shantharama Rai C |
: | 10.9790/2834-1506012130 |
Abstract: Video face recognition is a widely used method in which security is essential that recognizes the human faces from subjected videos. Unlike traditional methods, recent recognition methods consider practical constraints such as pose and illumination variations on the facial images. Our previous work also considers such constraints in which face recognition was performed on videos that were highly subjected pose and illumination variations. The method asserted good performance however; it suffers due to high computational cost. This work overcomes such drawback by proposing a simple face recognition technique in which a cost efficient Active Appearance Model (AAM) and lazy classification are deployed. The deployed AAM avoids nonlinear programming, which is the cornerstone for increased computational cost. Experimental results prove that the proposed method is better than the conventional technique in terms of recognition measures and computational cost.
Keywords: Active Appearance Model (AAM), lazy classification, shape, model, appearance, recognition, computation.
[1]. Wu-Jun Li, Chong-Jun Wang, Dian-Xiang Xu and Shi-Fu Chen, "Illumination Invariant Face Recognition Based on Neural Network Ensemble", In Proceedings of 16th IEEE International Conference on Tools with Artificial Intelligence, pp. 486-490, November 2004.
[2]. Majumdar and Ward, "Pseudo-Fisher face Method for Single Image Per Person Face Recognition", In Proceedings of IEEE International Conference on Acoustics, Speech and Signal Processing, Las Vegas, NV, pp. 989-992, 2008.
[3]. Genci Capi, "A Robotic System for Intelligent Real Time Face Recognition", ICGST International Journal on Automation, Robotics and Autonomous Systems, Vol. 9, No. 1, pp. 25-29, July 2009.
[4]. Rehab F. Abdel-Kader, Rabab M. Ramadan and Rawya Y. Rizk, "Rotation Invariant Face Recognition Based on Hybrid LPT/DCT Features", International Journal of Electrical and Computer Engineering, Vol. 3, No. 7, pp. 488-493, 2008.
[5]. Shaohua Kevin Zhou and Rama Chellappa, "Image-based face recognition under illumination and pose variations", Journal of the Optical Society of America A, Vol. 22, No. 2, pp. 217-229, 2005.
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Acoustic Doppler Curent Profiler to Measure Current Velocity |
Country | : | |
Authors | : | |
: | 10.9790/2834-1506013135 |
Abstract: Doppler speed log, an instrument that measures the speed of ships through the water or over the sea bottom was used before adcp. The first ADCP which was commercial, was based on concept of a commercial speed log . The speed log was refabricated to measure water velocity more precisely and to allow measurement in range cells over a depth profile. Henceforth, the first vessel-mounted ADCP was made. TRDI produced its first ADCP, a self-contained instrument designed for use in long-term in 1982. TRDI produced its first vessel-mounted ADCP In 1983. By 1986, TRDI had made five different frequencies (75-1200 kHz) and three different ADCP models (self-contained, vessel-mounted, and direct-reading). The concept of Doppler signal processing has established itself with the instruments afterwards. Speed logs used relatively simple processing with phase locked loops. The first generation of ADCPs used a narrow-bandwidth, single-pulse, autocorrelation method that computes the first moment of the Doppler frequency.....
[1]. Frank Bahr, research specialist in the Physical Oceanography Department at WHOI
[2]. Jim Culter, program manager of the Benthic Ecology Department at Mote Marine Laboratory
[3]. SonTek
[4]. RD Instruments - particularly the ADCP (BroadBand) Practical Primer
[5]. Adler, M. (1993) Messungen von durchflüssen und strömungsprofilen mit einem ultraschall-Doppler gerät (ADCP).
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | Jampack: An Enhancement in Design of Tactical Manet And Manpack Transceiver |
Country | : | India |
Authors | : | Sanyatjeet Pawde || Aditya Garg |
: | 10.9790/2834-1506013643 |
Abstract: MANETS have been used by the armed forces tactical communication in the battlefield. They provide dynamic connectivity without the requirement of any pre-existing infrastructure. There are times when our news media which is responsible for delivering news of every moment to the general public, jeopardizes the secrecy of certain tactical information, notions of strategic importance and even the lives of our Armed Forces personnel via live broadcast, just for the sake of TRP ratings. To prevent instantaneous broadcast of this clandestine information by the media houses we propose to enhance the existing MANET used in tactical environments by equipping every infantryman on the field of operation with a portable manpack transceiver integrated with ECM(electronic jamming) and ECCM(FHSS) equipment. In the presented work, a schematic representation of Manpack transceiver with integrated jammer circuit is designed and explained. Finally, different scenarios for ideal and jammer operation in a GSM based service on demand network is simulated and analyzed in Riverbed Modeler Academic edition 17.5..
Keywords – MANET, ECM, ECCM, Manpack Transceiver, Jamming, FHSS.
[1]. S. Al-Shehri and P. Loskot, "Enhancing Reliability of Tactical MANETs by Improving Routing Decisions," Journal of Low Power Electronics and Applications, vol. 8, no. 4, p. 49, Nov. 2018.
[2]. C. E. Fossa and T. G. Macdonald, "Internetworking tactical MANETs," 2010 –MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE, San Jose, CA, 2010, pp. 611-616, doi: 10.1109/MILCOM.2010.5680456.
[3]. Jahnke, Marko & Wenzel, Alexander & Klein, Gabriel & Aschenbruck, Nils & Gerhards-Padilla, Elmar & Ebinger, Peter & Karsch, Stefan. (2008). "MITE – MANET Intrusion Detection for Tactical Environments". Conference: NATO/RTO Research Symposium on Information Assurance for Emerging and Future Military Systems (RSY IST-076
[4]. H. Zhao, "Simulation of Barrage-Type Jamming for Synthetic Aperture Radars," 2008 ISECS International Colloquium on Computing, Communication, Control, and Management, Guangzhou, 2008, pp. 462-465, doi: 10.1109/CCCM.2008.96.
[5]. Lalitha, V. (2013). "The Impact of Transmission Power on the Performance of MANET Routing Protocols." IOSR Journal of Engineering. 03. 34-41. 10.9790/3021-03233441