IJMECS Vol. 6, No. 1, Jan. 2014
Cover page and Table of Contents: PDF (size: 117KB)
REGULAR PAPERS
In the basic Artificial Bee Colony (ABC) algorithm, if the fitness value associated with a food source is not improved for a certain number of specified trials then the corresponding bee becomes a scout to which a random value is assigned for finding the new food source. Basically, it is a mechanism of pulling out the candidate solution which may be entrapped in some local optimizer due to which its value is not improving. In the present study, we propose two new mechanisms for the movements of scout bees. In the first method, the scout bee follows a non-linear interpolated path while in the second one, scout bee follows Gaussian movement. Numerical results and statistical analysis of benchmark unconstrained, constrained and real life engineering design problems indicate that the proposed modifications enhance the performance of ABC.
[...] Read more.Radio Frequency Identification (RFID) is a method for automated identifying objects. One of the problems of this technology is its security. RFID tags include resource limitation; therefore, the system designers cannot implement complex circuits to enhance their security. Usually the symmetric and asymmetric encryption methods increase resources and cost. Because it is believed to increasing security is inconsistent with the simplicity, the researchers mostly use one-way encryption methods. In this paper, we propose a mutual authentication protocol based on public key cryptography. The used encryption method includes high security and low complexity. This protocol performs in few steps and is suitable for portable devices with power limitation. In terms of security, the proposed protocol is robust against known attacks. In addition, we prove the protocol is secure by an analytical method.
[...] Read more.Presently, there is a wide establishment of mobile computing across the globe and the number of subscribers worldwide including Nigeria is on the increase every day. It started with mobile voice communication and has gradually been extended to the capability of sending and receiving data across the cellular networks. Also, the coming of this technology has changed the face of business all over the world and will soon dominate all strata of the society. Therefore, this paper is looking at the past, present and the future of this technology, the areas of applications and vectors of mobility that are likely to shape the future of the technology. The reviews of the mobile computing technology from the First generation (1G) to fourth (4G) are presented. The relationships of the generations were presented. The issues relating to the emergence of new technology are also reviewed. The interworking of the technologies and how they helped in promoting the mobile technologies were also reviewed. The deployments issues from First generation (1G) to 3G and later to 4G are presented. The paper has reviewed how each of the technology came to being and thus served as an eye opener to those people that are not acquainted with these technologies.
[...] Read more.Product Development Life Cycle (PDLC) has been evolving from last decade from side to side unremitting progression of finest practices, process models and advance life cycles. Already present development models like rational unified process, waterfall model and spiral model have facilitated the people, who are being practicing the new models, to incalculably make their products better on the competence and effectiveness. Nevertheless, there is a need to quantify the product quality with the factors that are away from any traditional criterion like maintainability, reliability and the rest. Accomplishing a product that is technically strong only contributes a little part in sensational product market situation, but to what extent the product fulfills the major needs of the users reveals the real success of the product. Requirement Engineering (RE) and User Experience Design (UED) together make available the comprehended user requirements to product development team for successful implementation of product and further help the development team to resolve any problem that takes place. The paper emphasizes on the role of RE and UED during PDLC and discusses the challenges that comes out after coalition of RE and UED in product development. In the closing section some points are listed for determining these challenges.
[...] Read more.Continuous miniaturization of mobile devices has greatly increased its adoption and use by people in various facets of our lives. This has also increased the popularity of face recognition and image processing. Face recognition is now being employed for security purpose opening up the need for further research in recent time. Image compression becomes useful in cases when images need to be transmitted across networks in a less costly way by increasing data volume while reducing transmission time. This work discusses our findings on image compression and its effect on face recognition systems. We studied and implemented three well known face recognition algorithms and observed their recognition accuracy when gallery / probe images were compressed and/or uncompressed as one would naturally expect. For compression purposes, we adopted the JPEG and JPEG2000 coding standard. The face recognition algorithms studied are PCA, ICA and LDA. As a form of an extensive research, experiments conducted include both in compressed and uncompressed domains where the three algorithms have been exhaustively analyzed. We statistically present the results obtained which showed no significant depreciation in the recognition accuracies.
[...] Read more.The increasing demand for multi-degree-of-freedom (DOF) continuum robot in presence of highly nonlinear dynamic parameters in a number of industries has motivated a flurry of research in the development of soft computing nonlinear methodology. The robust backstopping controller proposed in this research is used to further demonstrate the appealing features exhibited by the continuum robot. Robust feedback controller is used to position control of continuum robot in presence of uncertainties. Using Lyapunov type stability arguments, a robust backstopping controller is designed to achieve this objective. The controller developed in this research is designed into two steps. Firstly, a robust stabilizing torque is designed for the nominal continuum robot dynamics derived using the constrained Lagrangian formulation based on modified PD backstopping controller. Next, the fuzzy logic methodology applied to it to solution uncertainty problem. The fuzzy model free problem is formulated to estimate the nonlinear formulation of continuum robot. The eventual stability of the controller depends on the torque generating capabilities of the continuum robots.
[...] Read more.A wireless sensor network (WSN) is a wireless network consisting of spatially distributed autonomous devices using sensors to monitor physical or environmental conditions.WSN is a fluorishing network that has numerous applications and could be used in diverse scenarios. DDoS (Distributed Denial of Service) is an attack where a number of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying service to the system to legitimate users.Not much research work has been done in DDoS in WSN.We are conducting a review on DDoS attack to show its impact on networks and to present various defensive, detection and preventive measures adopted by researchers till now.
[...] Read more.Availability of internet on different devices like smart phones like android based, IOs based, windows based and PDA etc. has brought into the evolution of mobile cloud computing, which is a vast side of research nowadays. Internet connectivity has become very easy with the evolution of Wi-Fi, everyone can access the internet using wireless connectivity. A major issue in wireless connectivity is the low level of encryption and low security. This might be a security risk for the sensitive data available on the cloud. There are mobile augmented reality systems based on cloud computing, we want to propose a dynamic framework for the security of cloud and live update data on cloud.
[...] Read more.