Nowadays, many services in the internet including Email, search engine, social networking are ... more Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by alicious automated programs (e.g., web bots) is becoming serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In our proposed technique we tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google’s reCAPTCHA and Microsoft’s CAPTCHA in terms of usability and security and found our system capable of deploying largely over internet.
Security in wireless network is a challenging issue in this
era. While much effort has be... more Security in wireless network is a challenging issue in this
era. While much effort has been made to address issues at
physical, data link, and network layers, little attention has
been paid to the security aspects central to the realistic
deployment of AODV routing protocol. In this paper we
propose a two-way-security to the existing protocol of
AODV. The first maintains the security of the nodes and
the other to that of messages, which are relayed through the nodes. So if any node fails in any case it doesn’t let the messages to be passed to the malicious outsiders.
Swarm intelligence (SI) algorithms generally come from
nature or biological behavior of n... more Swarm intelligence (SI) algorithms generally come from
nature or biological behavior of nature. These algorithms use probabilistic search methods that simulate the behavior of biological entities or the natural biological evolution. Swarm intelligence (SI) is based on collective behavior of self-organized systems. Typical swarm intelligence algorithms include Particle Swarm Optimization (PSO), Ant Colony System (ACS), Bacteria Foraging (BF), the Artificial Bee Colony (ABC), and so on. Recently some new swarm based algorithms like Firefly Algorithm (FA) and Bat Algorithm (BA) has emerged. BA is a new optimization technique, which is based on the echolocation behavior of bats. BA is very efficient in exploitations but relatively poor in explorations. In this paper, a Novel Adaptive Bat Algorithm (NABA) is presented to improve the explorative characteristics of BA. The proposed algorithm incorporates two techniques within BA to improve its degree of explorations, which include the Rechenberg’s 1/5 mutation rule and the Gaussian probability distribution to produce mutation step sizes. Both these techniques try to balance between the explorative and exploitative properties of BA. Simulation results on a number of benchmark functions on the continuous optimization problem suggest that the proposed algorithm – NABA often show much improved results, compared to the standard BA.
Nature is a rich source of inspiration, which has inspired many researchers in many ways. Nowaday... more Nature is a rich source of inspiration, which has inspired many researchers in many ways. Nowadays, new algorithms have been developed by the inspiration from nature. The flower pollination algorithm is based on the characteristics of pollination process of flowers plants. Pollination is a natural biological process of mating in plants. In flowers, pollen is carried to stigma through some mechanisms that confirm a proper balance in the genetic creations of the species. Another nature inspired algorithm — the Bat algorithm is based on the echolocation behavior of bats. In this paper, the Flower pollination algorithm is compared with the basic Bat algorithm. We have tested these two algorithms on both unimodal and multimodal, low and high dimensional continuous functions. Simulation results suggest that the Flower pollination algorithm can perform much better than the Bat algorithm on the continuous optimization problems.
Present IPTV system fails to establish QoS due to packet loss, server congestion and limited ban... more Present IPTV system fails to establish QoS due to packet loss, server congestion and limited bandwidth. To overcome these drawbacks an implementation of IPTV is presented here using MPLS in 3GPP LTE release 8 networks. This implementation will provide multicast capability and FEC along with retransmission to minimize packet loss. Deploying IPTV in LTE makes LTE capable of transmitting voice, data and audio/video which will ensure convergence.
Nowadays, many services in the internet including Email, search engine, social networking are ... more Nowadays, many services in the internet including Email, search engine, social networking are provided with free of charge due to enormous growth of web users. With the expansion of Web services, denial of service (DoS) attacks by alicious automated programs (e.g., web bots) is becoming serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In our proposed technique we tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google’s reCAPTCHA and Microsoft’s CAPTCHA in terms of usability and security and found our system capable of deploying largely over internet.
Security in wireless network is a challenging issue in this
era. While much effort has be... more Security in wireless network is a challenging issue in this
era. While much effort has been made to address issues at
physical, data link, and network layers, little attention has
been paid to the security aspects central to the realistic
deployment of AODV routing protocol. In this paper we
propose a two-way-security to the existing protocol of
AODV. The first maintains the security of the nodes and
the other to that of messages, which are relayed through the nodes. So if any node fails in any case it doesn’t let the messages to be passed to the malicious outsiders.
Swarm intelligence (SI) algorithms generally come from
nature or biological behavior of n... more Swarm intelligence (SI) algorithms generally come from
nature or biological behavior of nature. These algorithms use probabilistic search methods that simulate the behavior of biological entities or the natural biological evolution. Swarm intelligence (SI) is based on collective behavior of self-organized systems. Typical swarm intelligence algorithms include Particle Swarm Optimization (PSO), Ant Colony System (ACS), Bacteria Foraging (BF), the Artificial Bee Colony (ABC), and so on. Recently some new swarm based algorithms like Firefly Algorithm (FA) and Bat Algorithm (BA) has emerged. BA is a new optimization technique, which is based on the echolocation behavior of bats. BA is very efficient in exploitations but relatively poor in explorations. In this paper, a Novel Adaptive Bat Algorithm (NABA) is presented to improve the explorative characteristics of BA. The proposed algorithm incorporates two techniques within BA to improve its degree of explorations, which include the Rechenberg’s 1/5 mutation rule and the Gaussian probability distribution to produce mutation step sizes. Both these techniques try to balance between the explorative and exploitative properties of BA. Simulation results on a number of benchmark functions on the continuous optimization problem suggest that the proposed algorithm – NABA often show much improved results, compared to the standard BA.
Nature is a rich source of inspiration, which has inspired many researchers in many ways. Nowaday... more Nature is a rich source of inspiration, which has inspired many researchers in many ways. Nowadays, new algorithms have been developed by the inspiration from nature. The flower pollination algorithm is based on the characteristics of pollination process of flowers plants. Pollination is a natural biological process of mating in plants. In flowers, pollen is carried to stigma through some mechanisms that confirm a proper balance in the genetic creations of the species. Another nature inspired algorithm — the Bat algorithm is based on the echolocation behavior of bats. In this paper, the Flower pollination algorithm is compared with the basic Bat algorithm. We have tested these two algorithms on both unimodal and multimodal, low and high dimensional continuous functions. Simulation results suggest that the Flower pollination algorithm can perform much better than the Bat algorithm on the continuous optimization problems.
Present IPTV system fails to establish QoS due to packet loss, server congestion and limited ban... more Present IPTV system fails to establish QoS due to packet loss, server congestion and limited bandwidth. To overcome these drawbacks an implementation of IPTV is presented here using MPLS in 3GPP LTE release 8 networks. This implementation will provide multicast capability and FEC along with retransmission to minimize packet loss. Deploying IPTV in LTE makes LTE capable of transmitting voice, data and audio/video which will ensure convergence.
Uploads
Papers by Nazmus Sakib Rupol
expansion of Web services, denial of service (DoS) attacks by
alicious automated programs (e.g., web bots) is becoming
serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In our proposed technique we tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google’s reCAPTCHA and Microsoft’s CAPTCHA in terms of usability and security and found our system capable of deploying largely over internet.
era. While much effort has been made to address issues at
physical, data link, and network layers, little attention has
been paid to the security aspects central to the realistic
deployment of AODV routing protocol. In this paper we
propose a two-way-security to the existing protocol of
AODV. The first maintains the security of the nodes and
the other to that of messages, which are relayed through the nodes. So if any node fails in any case it doesn’t let the messages to be passed to the malicious outsiders.
nature or biological behavior of nature. These algorithms use probabilistic search methods that simulate the behavior of biological entities or the natural biological evolution. Swarm intelligence (SI) is based on collective behavior of self-organized systems. Typical swarm intelligence algorithms include Particle Swarm Optimization (PSO), Ant Colony System (ACS), Bacteria Foraging (BF), the Artificial Bee Colony (ABC), and so on. Recently some new swarm based algorithms like Firefly Algorithm (FA) and Bat Algorithm (BA) has emerged. BA is a new optimization technique, which is based on the echolocation behavior of bats. BA is very efficient in exploitations but relatively poor in explorations. In this paper, a Novel Adaptive Bat Algorithm (NABA) is presented to improve the explorative characteristics of BA. The proposed algorithm incorporates two techniques within BA to improve its degree of explorations, which include the Rechenberg’s 1/5 mutation rule and the Gaussian probability distribution to produce mutation step sizes. Both these techniques try to balance between the explorative and exploitative properties of BA. Simulation results on a number of benchmark functions on the continuous optimization problem suggest that the proposed algorithm – NABA often show much improved results, compared to the standard BA.
expansion of Web services, denial of service (DoS) attacks by
alicious automated programs (e.g., web bots) is becoming
serious problem of web service accounts. A HIP, or Human Interactive Proofs, is a human authentication mechanism that generates and grades tests to determine whether the user is a human or a malicious computer program. Unfortunately, the existing HIPs tried to maximize the difficulty for automated programs to pass tests by increasing distortion or noise. Consequently, it has also become difficult for potential users too. So there is a tradeoff between the usability and robustness in designing HIP tests. In our proposed technique we tried to balance the readability and security by adding contextual information in the form of natural conversation without reducing the distortion and noise. In the result section, a microscopic large-scale user study was conducted involving 110 users to investigate the actual user views compare to existing state of the art CAPTCHA systems like Google’s reCAPTCHA and Microsoft’s CAPTCHA in terms of usability and security and found our system capable of deploying largely over internet.
era. While much effort has been made to address issues at
physical, data link, and network layers, little attention has
been paid to the security aspects central to the realistic
deployment of AODV routing protocol. In this paper we
propose a two-way-security to the existing protocol of
AODV. The first maintains the security of the nodes and
the other to that of messages, which are relayed through the nodes. So if any node fails in any case it doesn’t let the messages to be passed to the malicious outsiders.
nature or biological behavior of nature. These algorithms use probabilistic search methods that simulate the behavior of biological entities or the natural biological evolution. Swarm intelligence (SI) is based on collective behavior of self-organized systems. Typical swarm intelligence algorithms include Particle Swarm Optimization (PSO), Ant Colony System (ACS), Bacteria Foraging (BF), the Artificial Bee Colony (ABC), and so on. Recently some new swarm based algorithms like Firefly Algorithm (FA) and Bat Algorithm (BA) has emerged. BA is a new optimization technique, which is based on the echolocation behavior of bats. BA is very efficient in exploitations but relatively poor in explorations. In this paper, a Novel Adaptive Bat Algorithm (NABA) is presented to improve the explorative characteristics of BA. The proposed algorithm incorporates two techniques within BA to improve its degree of explorations, which include the Rechenberg’s 1/5 mutation rule and the Gaussian probability distribution to produce mutation step sizes. Both these techniques try to balance between the explorative and exploitative properties of BA. Simulation results on a number of benchmark functions on the continuous optimization problem suggest that the proposed algorithm – NABA often show much improved results, compared to the standard BA.