{"title":"A new model for Reliability Estimation of Component-Based Software","authors":"Aditya Pratap Singh, P. Tomar","doi":"10.1109/IADCC.2013.6514437","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514437","url":null,"abstract":"Component-Based Software Engineering is a perfect approach for rapid software development with the maturity of components. The estimation of Component-Based Software (CBS) reliability from the reliabilities of constituent components and architecture is a matter of concern. In this paper we propose a Reliability Estimation Model for CBS to estimate the reliability through path propagation probability and component impact factor. This model incorporates the idea of path propagation to estimate overall system reliability after integration of components, which considers the contribution of the individual components that get activated during an execution path. This model also estimates the impact factor of individual components on overall reliability. The impact factor can be used to focus the efforts to obtain the best reliability improvements. To evaluate the Reliability Estimation Model including both the factors, we implement it through JAVA, which is based on an adapted example case study. Lastly we conclude that proposed model is useful to estimate the reliability of CBS and can be used adaptively in early stages of software development.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125009017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient defense method against UDP spoofed flooding traffic of denial of service (DoS) attacks in VANET","authors":"K. Verma, H. Hasbullah, A. Kumar","doi":"10.1109/IADCC.2013.6514286","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514286","url":null,"abstract":"Vehicular Ad hoc Networks (VANET) have emerged as a subset of the Mobile Ad hoc Network (MANET) application; it is considered to be a substantial approach to the Intelligent Transportation System (ITS). VANETs were introduced to support drivers and improve safety issues and driving comfort, as a step towards constructing a safer, cleaner and more intelligent environment. At the present time, vehicles are exposed to many security threats. One of them is the User Datagram Protocol (UDP)- based flooding which is a common form of Denial of Service (DoS) attacks, in which a malicious node forges a large number of fake identities, i.e.-, Internet Protocol (IP) spoofing addresses in order to disrupt the proper functions of the fair data transfer between two fast moving vehicles. Incorporating IP spoofing in the DoS attacks makes it even more difficult to defend against such attacks. In this paper, an efficient method is proposed to detect and defend against UDP flooding attacks under different IP spoofing types. The method makes use of a storage-efficient data structure and a Bloom filter based IPCHOCKREFERENCE detection method. This lightweight approach makes it relatively easy to deploy as its resource requirement is reasonably low. Simulation results consistently showed that the method is both efficient and effective in defending against UDP flooding attacks under different IP spoofing types. Specifically, the method outperformed others in achieving a higher detection rate yet with lower storage and computational costs.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123269557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Solving fuzzy linear fractional programming problem using signed distance ranking","authors":"P. K. De, M. Deb","doi":"10.1109/IADCC.2013.6514330","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514330","url":null,"abstract":"In the present paper,attention has been given to the study of fuzzy linear fractional programming problem(FLFPP) using sign distance ranking method,where all the parameters and variables are characterized by triangular fuzzy numbers.A computational procedure has been presented to obtain an optimal solution by applying simplex method and a numerical example is given to demonstrate the algorithm to solve this FLFPP.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123838286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network on chip for DTMF Decoder and TDM switching in telecommunication network with HDL environment","authors":"P. Kuchhal, S. Singhal, A. Kumar","doi":"10.1109/IADCC.2013.6514464","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514464","url":null,"abstract":"The communication switching system enables the universal connectivity. The universal connectivity is realized when any entity in one part of the world can communicate with any other entity in another part of the world. In many ways telecommunication will acts as a substitute for the increasingly expensive physical transportation. The telecommunication links and switching were mainly designed for voice communication. Traffic handling capacity is an important element of service quality and will therefore play a basic role in this choice Microprocessor/microcontroller (MPMC) system can handle sequential operations with high flexibility and use of Field Programmable Gate Array (FPGA) can handle concurrent operations with high speed in small size area. So combined features of both these systems can enhance the performance of the system. High Performance Hybrid Telephone Network System (HTSS) is designed using combination of stored program control (SPC) and VLSI technology. Touch tone receiver follows DTMF (Dual tone Multifrequency) concept and Time division multiplexing chip is used for the call establishment for inter and intra communication.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Model-based test-case generation for Simulink/Stateflow using dependency graph approach","authors":"A. Sridhar, Dasaiah Srinivasulu, D. Mohapatra","doi":"10.1109/IADCC.2013.6514434","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514434","url":null,"abstract":"Testing is an ultimate phase of product life cycle to which particular attention is paid, namely when dependability is of great importance. Modeling technology has been introduced into the software testing field. However how to carry through the testing modeling effectively is still a difficulty. Based on the combination of simulation modeling technology and dependability we have proposed an approach to generate test cases. In our approach, first, the system is modeled in MATLAB using Simulink/ Stateflow tool. After the model creation we verify that system and generate a dependency graph of that system. From that graph we generate test sequences.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131882923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of high speed hybrid carry select adder","authors":"S. Parmar, K. P. Singh","doi":"10.1109/IADCC.2013.6514477","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514477","url":null,"abstract":"The paper describes the power and area efficient carry select adder (CSA). Firstly, CSA is one of the fastest adders used in many data-processing systems to perform fast arithmetic operations. Secondly, CSA is intermediate between small areas but longer delay Ripple Carry Adder (RCA) and a larger area with shorter delay carry look-ahead adder. Third, there is still scope to reduce area in CSA by introduction of some add-one scheme. In Modified Carry Select Adder (MCSA) design, single RCA and BEC are used instead of dual RCAs to reduce area and power consumption with small speed penalty. The reason for area reduction is that, the number of logic gates used to design a BEC is less than the number of logic gates used for a RCA design. Thus, importance of BEC logic comes from the large silicon area reduction when designing MCSA for large number of bits. MCSA architectures are designed for 8-bit, 16-bit, 32-bit and 64-bit respectively. The design has been synthesized at 90nm process technology targeting using Xilinx Spartan-3 device. Comparison results of modified CSA with conventional CSA show better results and improvements.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"445 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131804492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Sreenivas, G. C. Bhanu Prakash, K. Ramakrishnan
{"title":"L2DB-TCP: An adaptive congestion control technique for MANET based on link layer measurements","authors":"B. Sreenivas, G. C. Bhanu Prakash, K. Ramakrishnan","doi":"10.1109/IADCC.2013.6514378","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514378","url":null,"abstract":"Congestion control is a key problem in mobile ad-hoc networks. Congestion has a severe impact on the throughput, routing and performance. Identifying the occurrence of congestion in a Mobile Ad-hoc Network (MANET) is a challenging task. The congestion control techniques provided by Transmission Control Protocol (TCP) is specially designed for wired networks. There are several approaches designed over TCP for detecting and overcoming the congestion. This paper considers design of Link-Layer congestion control for ad hoc wireless networks, where the bandwidth and delay is measured at each node along the path. Based on the cumulated values, the receiver calculates the new window size and transmits this information to the sender as feedback. The sender behavior is altered appropriately. The proposed technique is also compatible with standard TCP.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116617799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pair-wise key establishment using Random Number & distinct random functions in WSNs","authors":"S. Kumar, R. Singh","doi":"10.1109/IADCC.2013.6514340","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514340","url":null,"abstract":"Accomplishing Security in WSNs (Wireless Sensor Networks) is still untapped and is one of the very crucial tasks in field of Research & Development. WSNs constitute various resource-constrained sensor nodes which communicate among themselves through wireless links and have limited computational abilities, memory storage and physical capabilities. Exponential growth in field of intrusion and eavesdropping has lead to challenging task for secure communication. So paying heed on distributing keys among sensor nodes before establishing connection is the key issue. So this proposed paper has come up with a new robust key pre-distribution scheme using Random Prime Numbers & Functions which resolves threat without breaching security aspects. This new proposed mechanism has the power to achieve pair-wise keys between two sensor nodes using Algebraic, Exponential, Logarithmic and Discontinuous function with the key role of random prime number generation and functions which prevents eavesdroppers from performing security hacks. Thus it's very difficult to get spoofed.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128858958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A secure and searchable data storage in Cloud computing","authors":"S. Gupta, S. Satapathy, P. Mehta, A. Tripathy","doi":"10.1109/IADCC.2013.6514203","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514203","url":null,"abstract":"The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. Now a day's Cloud computing is a buzz word and it is still in its infancy in terms of its implementation at all levels due the limitations it suffers. Most of the security schemes require a basic level of trust between the data owner and cloud provider, when this trust is breached either intentionally or unintentionally it is the data and its owner that suffers. Thus, we suggest a scheme where the trust from service provider is not required. The security of data will be in control of the data owner solely. It would mainly contain a tool that would allow the owner of the data to decide about the access rights of his/her data, revocation if any, and notification if any security breaches are in place. This paper also allows a user to search their files in an encrypted database with the help of ranked keyword search which is an improvement over conventional searching techniques.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130737636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effect of dimensionality reduction on performance in artificial neural network for user authentication","authors":"S. Chauhan, K. Prema","doi":"10.1109/IADCC.2013.6514327","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514327","url":null,"abstract":"Security is an important concern for today's generation, where keystroke-scan had come out as a milestone. In this paper, a comparison approach is presented for user authentication using keystroke dynamics. Here we have shown the effect of Dimensionality Reduction techniques on the performance and the misclassification rate is between 9.17% and 9.53%. It helps in improving the performance of the system after reducing the dimensions of input data. We have used three dimensional reduction techniques like: Principal Component Analysis (PCA), Multidimensional scaling (MDS), and probabilistic PCA. Here, PCA provide 9.17% misclassification rate with better performance for keystroke samples of 10 users and each user is having 400 samples for the same password.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130910981","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}