Lahore Garrison University Research Journal of Computer Science and Information Technology最新文献

筛选
英文 中文
IoT based Smart Traffic Signal: Time Stealer 基于物联网的智能交通信号:窃取时间
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401144
Adeel Munawar
{"title":"IoT based Smart Traffic Signal: Time Stealer","authors":"Adeel Munawar","doi":"10.54692/lgurjcsit.2020.0401144","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401144","url":null,"abstract":"The increased numbers of private vehicles on the roads has added much to the traffic congestions and wait time at the intersections. To make cities smart and smart cities smarter by reducing this problem, the number of systems has been and is being developed, as it also causes the wastage of time, fuel and also increases air and noise pollution. In this paper, we present a system ‘Time Stealer’ which will check the density of the traffic on the sides of the road and will give green light time accordingly keeping in view that all sides get their turn. This system will reduce the wait time that vehicles do even when there is no traffic on the green side and will also avoid signal jumping which is very common in our country and also a cause of the number of accident.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132261361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of Various Load Balancing Techniques in a Centralized and Distributed Cloud Computing Environment 集中式和分布式云计算环境下各种负载均衡技术的比较
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401143
Khadija Javed
{"title":"Comparison of Various Load Balancing Techniques in a Centralized and Distributed Cloud Computing Environment","authors":"Khadija Javed","doi":"10.54692/lgurjcsit.2020.0401143","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401143","url":null,"abstract":"cloud computing presently plays a significant job in our lives. The cloud is a platform that provides high accessibility, dynamic asset pools, and virtualization. By improving, it enables a huge reduction in cost. Load Balance in cloud computing is very important. For cloud computing, there are different techniques available that have different parameters. Many methods are used centrally and some are used in cloud computing distributed environments. In this exploration, we have thought about both, brought together and conveyed methods after picking the best load-balancing procedure that depends on various parameters, for example, execution, over-burden, throughput, reaction time, and movement time.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130636909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Approach of Tailoring PMBOK activities that best suit Software Development Projects 裁剪最适合软件开发项目的PMBOK活动的新方法
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401140
Waleed Iftikhar
{"title":"A Novel Approach of Tailoring PMBOK activities that best suit Software Development Projects","authors":"Waleed Iftikhar","doi":"10.54692/lgurjcsit.2020.0401140","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401140","url":null,"abstract":"Project management is very critical for any project's success regardless of its category. Various Project management methodologies are available that provide set of guidelines and standards to effectively and efficiently manage projects in the organization. Managing software development projects has faced a lot of challenges while complying with these project management methodologies. This is mainly because project management methodologies like PMBOK does not provide specific guidelines for managing software development projects. This embarks the importance of project management tailoring activities in the software development firms, to tailor these project management methodologies according to their own need. This paper will propose six most essential tailoring activities for managing software development projects. These tailoring activities will be performed on the project management body of knowledge (PMBOK).","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129559235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Yolo with Dropout 优化Yolo与Dropout
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2020-03-26 DOI: 10.54692/lgurjcsit.2020.0401145
Mubashir Ali
{"title":"Optimized Yolo with Dropout","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2020.0401145","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2020.0401145","url":null,"abstract":"The goal is to recognize different objects by applying the YOLO (You Only Look Once) technique. This technique has a few benefits in contrast to any other techniques for object detection and tracking. In some codes as Fast Convolutional Neural Network (FCNN) and Convolutional Neural Network (CNN) the code will not focus at the picture entirely but for the case of YOLO, the code focuses the entire image by concluding the detection boxes utilizing a convolutional neural framework and the probability of classes for the bounding boxes and finds the image immediately in contrast to some different codes. The dropout layer is also programed at the end to avoid over fitting issues. It is seen that using dropout the results have improved much.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2020-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm 基于IPK算法的AIoT设备的智能安全通信
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030487
Muhammad Adnan Khan
{"title":"An Intelligent and Secure Communication of AIoT enabled Devices empowered with IPK Algorithm","authors":"Muhammad Adnan Khan","doi":"10.54692/lgurjcsit.2019.030487","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030487","url":null,"abstract":"Artificial intelligence Internet of Things (AIoT) will be a necessary part of our lives in the near future. It will be found as quick cooperation in our surroundings through the related sensor-based system. To be sure, even in an indirect method, it will serve us in a couple of structures as esteem included organizations over the cell stages. With the AIoT structures that make usage of data, actually, the data collection from contraptions can in like manner be a goal of cyberattacks. Device to Device (D-2-D) interchanges in AIoT was planned alongside various shows, for instance, Constrained Access Protocol (CoAP). Its huge stresses in the course of action of AIoT are to ensure the security of mechanisms and D-2-D one place to another. Furthermore, present correspondence shows for AIoT arewithout reliability features. It is a result of this that countermeasures in perspective on encryption are starting at now getting importance. There is a requirement for a solid cryptosystem for D-2-D in AIoT. In this investigation paper, we present an encryption technique which is indicated as EPEB as a security answer for AIoT. The proposed methodology works with the message which shows special characters, numbers, and bits for data encryption and decryption. In authority, the end key isn't known so we would encryption to able have the option to gadgets data using particular keys and scramble packet per specialkey.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116417870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovery Method for Disasters of Network Servers by Using POX controller in Software defined Networks. 软件定义网络中基于POX控制器的网络服务器灾难恢复方法。
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030492
Asis Jamal, Sarah Javed, Arslan Akram, Shahzaib Jamal
{"title":"Recovery Method for Disasters of Network Servers by Using POX controller in Software defined Networks.","authors":"Asis Jamal, Sarah Javed, Arslan Akram, Shahzaib Jamal","doi":"10.54692/lgurjcsit.2019.030492","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030492","url":null,"abstract":"The devices we used to automation made up of electric bunch called IoT devices so the more complex task is to manage them effectively. If the devices cannot connect or share anything correctly then these devices will be considered as useless. So the diversity of these devices will be increase the chance of survival. When we talk about the disaster the main difference between networks software and hardware needed to be overcome . for this we have to control the data traffic smartly so the software defined networks make this thing possible to give more programmability because in SDN the data plane is separated from control plane. When IoT devices got disconnected because of internet lack at that time these devices have to respond quickly. So for this purpose, software defined networks used to search another path for information transfer just to get that connection back we can say SDN provides reroute based on the routing information and routing flows they have already and they also have better understanding of pathways for communication. So in this paper our main focus is on this problem that will occur because of disaster and we intend to recover server and also multiple servers from this disaster of link failure , traffic engineering , power outage and rerouting of packets. For this we proposed a systematic approach for recovering these servers from disaster by using software defined networks. The separation of control plane from data plane provides programmability and also make the system flexible for getting back the connection soon. So for this recovery from disaster we are going to use OpenFlow protocol used by SDN and we using Mininet to implementation. The controller will be POX and also we are using Lipsflow mapping for disaster management and recovery.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125578807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Storage Security Using Blockchain Technology 使用区块链技术的云存储安全
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030489
Fahad Ahamd
{"title":"Cloud Storage Security Using Blockchain Technology","authors":"Fahad Ahamd","doi":"10.54692/lgurjcsit.2019.030489","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030489","url":null,"abstract":"Data is increasing with increasing Internet technology. To handle the large data, more applications choose to enlarge storage capacity via Cloud plate form. It will not a surprise if we say most organizations have moved towards the cloud. While using the cloud, we have to keep our trust for our sensitive and private data in third parties and the data is usually not encrypted. But we need to implement nearly procedures for the assurance of our reserved data. This will be occupied by blockchains. Blockchain has been a center of attention as a next-generation goal because of its security. A comprehensive approach is used in this paper by signifying diverse blockchain methods to protect cloud computing.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130734655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Testing for cyber Security 网络安全软件测试
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030493
Arfa Hasan, Muhammad Adnan Khan
{"title":"Software Testing for cyber Security","authors":"Arfa Hasan, Muhammad Adnan Khan","doi":"10.54692/lgurjcsit.2019.030493","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030493","url":null,"abstract":"Software testing plays a vital role in software security because hackers attack on a system through back channels which they can easily find if there is any error or bug exists in the software. The software security failure can cause the unbearable loss for IT companies and other organizations. Cyber security is another big issue for computer users' personal data as all their information is vulnerable because of easy excess, visibility and availability. Therefore, software testing is also useful to secure the personal information. In this article, cyber security testing based on particle swam optimization algorithm (CST) is proposed for testing of software cyber security testing. CSTPSOA is a PSO base technique which is used to solve the complex multi-level problems and is also used for optimization. In the CST method PSO is used for the optimization of test cases for cyber security testing.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133578744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preservation of Privacy of Big Data Using Efficient Anonymization Technique 利用高效匿名化技术保护大数据隐私
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030488
Fahad Ahamd
{"title":"Preservation of Privacy of Big Data Using Efficient Anonymization Technique","authors":"Fahad Ahamd","doi":"10.54692/lgurjcsit.2019.030488","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030488","url":null,"abstract":"Big data needs to be kept private because of the increase in the amount of data. Data is generated from social networks, organizations and various other ways, which is known as big data. Big data requires large storage as well as high computational power. At every stage, the data needs to be protected. Privacy preservation plays an important role in keeping sensitive information protected and private from any attack. Data anonymization is one of the techniques to anonymize data to keep it private and protected, which includes suppression, generalization, and bucketization. It keeps personal and private data anonymous from being known by others. But when it is implemented on big data, these techniques cause a great loss of information and also fail in defense of the privacy of big data. Moreover, for the scenario of big data, the anonymization should not only focus on hiding but also on other aspects. This paper aims to provide a technique that uses slicing, suppression, and functional encryption together to achieve better privacy of big data with data anonymization.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128802704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Based Architecture for Basketball Supervision 基于物联网的篮球监管架构
Lahore Garrison University Research Journal of Computer Science and Information Technology Pub Date : 2019-12-31 DOI: 10.54692/lgurjcsit.2019.030490
Mubashir Ali
{"title":"IoT Based Architecture for Basketball Supervision","authors":"Mubashir Ali","doi":"10.54692/lgurjcsit.2019.030490","DOIUrl":"https://doi.org/10.54692/lgurjcsit.2019.030490","url":null,"abstract":"Basketball is one of the most played games in the world with a huge amount of fan following and has a great number of basketballers. Sometimes players get severe lower body wounds such as ankle sprains, shortage of breath, head, teeth, hand, and fingers. Female players have a higher risk of knee injuries than male players. These are health issues that players face while playing basketball. Sports organizations spend millions to train fresh basketball players or for the development of the previous basketball players. The internet of things (IoT) made everyday things readable, controllable and recognizable through the internet and the wireless sensor networks. It is simply the network of interconnected devices that are embedded with sensors, software, and connectivity modules.Nowadays, with this growing technology it is possible to protect the life of players in the game as well as in training sessions, if we detect the problems early in players and appropriate actions will be taken to reduce adverse health effects which can be very dangerous. In this paper, we will propose an architecturefor basketball based on the internet of things (IoT). The main goal behind this approach is to introduce a healthcare system based upon sensors, actuators, devices and telecommunication technologies to communicating real-time stats.","PeriodicalId":197260,"journal":{"name":"Lahore Garrison University Research Journal of Computer Science and Information Technology","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122608129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信