Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Automated object identification has seen significant progress during the last decade with close to human-level accuracy, aided by deep learning methods. With the rapid rise of obesity and other lifestyle-related diseases worldwide, the... more
Automated object identification has seen significant progress during the last decade with close to human-level accuracy, aided by deep learning methods. With the rapid rise of obesity and other lifestyle-related diseases worldwide, the availability of fast, automated, and reliable image-based food calorie estimation is becoming a necessity. With the help of a deep learning-based automated object identification system, it is possible to introduce accurate and intelligent solutions in the form of a mobile app. However, for these kind of applications, processing speed is an important concern as the images should be processed in real time. Although plenty of studies have been conducted that focus on food image detection-based calorie estimation, there is still a lack of an image-driven, lightweight, fast, and reliable food calorie estimation system. In this paper, we propose a method based on the parameter-optimized Convolution Neural Networks (CNN) for detecting food images of regular ...
This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to... more
This paper focuses on the quantitative analysis of RFID based vehicle toll collection system. Since we conduct the quantitative analysis long before the implementation of the infrastructure, the approach is realized by the UML and SPN to capture the system dynamics and carry out multiple performance tests of the possible infrastructure. Thus, the performance tests ensure the installation of correct number of RFID vehicle toll collection booth in the entrance of a bridge or a highway so that the traffic congestion can be kept as minimal as possible as well as financial viability can be confirmed. We analyze the response time and throughput to know the maximum limit for the diverse number of arrival vehicles that is served by the different number of toll booths. This finally gives us a better understanding of the number of units necessary for toll collection to decrease the traffic congestion in a budget constraint manner.
Static password is no more considered as a secure alternative to attain the authentication of the valid user in the internet world. This already opens the door for the attackers to compromise the password because of several vulnerable... more
Static password is no more considered as a secure alternative to attain the authentication of the valid user in the internet world. This already opens the door for the attackers to compromise the password because of several vulnerable security attacks. Thus, it needs a secure mechanism which introduces the concept of OTP where password is frequently changed and valid for a certain period. The concept makes the OTP a strong alternative of static password that is widely used now a day. However, now smart phone is convenient and commonly used media to receive OTP generated by the system which is threatened by the man-in-themiddle attack if the channel for transferring the OTP to the user end is not protected. Bearing this shortcoming of existing OTP system, we develop a method where the user will perform a certain intermediate mathematical calculation before using the OTP received by the smart phone and thus, incorporates an extra layer of security in the existing OTP system. This extra layer of security protects the method from usual security attacks whether the channel used for transferring OTP is compromised or not. This new method of OTP has noticeable improvements in performance over the existing system and puts no extra burden in the server-side verification process.
We are living in a world where almost every system is getting smart and automated in the industry, in business sectors, and also in homes. In smart home automation system, it involves of controlling various home appliances automatically... more
We are living in a world where almost every system is getting smart and automated in the industry, in business sectors, and also in homes. In smart home automation system, it involves of controlling various home appliances automatically with the help of exploiting technologies over desktops, laptops, smart phones, or tablets. The home automation system attains great popularity in the last decades and it improves the life of the people by providing the people to feel comfort as well as to feel safe. In this paper, we are developing services for a smart home automation system that will monitor the air quality, water quality, security system, fire system as well as control the temperature, lights, and access control of home. Precise semantics of the service specification is necessary to develop the service accurately. Thus, we use UML activity to provide the service specification and formalize our service specification by the temporal logic cTLA so that verification can be done before implementing this in the real setting.
Distributed system poses one of the main streams of information and communication technology arena with immense complexity. Designing and implementation of such complex systems are always an intricate endeavour. Likewise, performance... more
Distributed system poses one of the main streams of information and communication technology arena with immense complexity. Designing and implementation of such complex systems are always an intricate endeavour. Likewise, performance evaluation is also a great concern of such complex system to evaluate whether the system meets the
A distributed system is a complex system. Developing complex systems is a demanding task when attempting to achieve functional and non-functional properties such as synchronization, communication, fault tolerance. These properties impose... more
A distributed system is a complex system. Developing complex systems is a demanding task when attempting to achieve functional and non-functional properties such as synchronization, communication, fault tolerance. These properties impose immense complexities on the design, development, and implementation of the system that incur massive effort and cost. Therefore, it is vital to ensure that the system must satisfy the functional and non-functional properties. Once a distributed system is developed, it is very difficult and demanding to conduct any modification in its architecture. As a result, the quantitative analysis of a complex distributed system at the early stage of the development process is always an essential and intricate endeavor. To meet the above challenge, this chapter introduces an extensive framework for performability evaluation of a distributed system. The goal of the performability modeling framework is to consider the behavioral change of the system components du...
To meet the challenge of conducting quantitative analysis at the early stage of the system development process, this chapter introduces an extensive framework for performance modeling of a distributed system. The goal of the performance... more
To meet the challenge of conducting quantitative analysis at the early stage of the system development process, this chapter introduces an extensive framework for performance modeling of a distributed system. The goal of the performance modeling framework is the assessment of the non-functional properties of the distributed system at an early stage based on the system's functional description and deployment mapping of service components over an execution environment. System's functional description with deployment mapping has been specified using UML. To analyze the correctness of the UML specification style, we have used temporal logic, specifically cTLA, to formalize the UML model. We have shown in detail how UML models are formalized by a set of cTLA processes and production rules. To conduct the performance evaluation of a distributed system, the UML model is transformed into analytic model SRN. We have specified an automated model transformation process to generate SRN ...
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 1, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 ... Md. Sakhawat Hossen1#, AFM Sultanul Kabir2, Razib Hayat Khan3 and Abdullah Azfar1* ... 1... more
IJCSI International Journal of Computer Science Issues, Vol. 7, Issue 1, No. 1, January 2010 ISSN (Online): 1694-0784 ISSN (Print): 1694-0814 ... Md. Sakhawat Hossen1#, AFM Sultanul Kabir2, Razib Hayat Khan3 and Abdullah Azfar1* ... 1 School of Information and ...
Royal Institute of Technology (KTH) Stockholm Sweden 3Department of Telematics Norwegian University Of Science and Technology (NTNU), Norway msimamun@kth.se,afmk@kth.se,hossen @kth.se, rkhan@item.ntnu.no Abstract— In recent years,... more
Royal Institute of Technology (KTH) Stockholm Sweden 3Department of Telematics Norwegian University Of Science and Technology (NTNU), Norway msimamun@kth.se,afmk@kth.se,hossen @kth.se, rkhan@item.ntnu.no Abstract— In recent years, wireless sensor network ...
With the mandate of light-weight working practices, iterative development, customer collaboration and incremental delivery of business values, Agile software development methods have become the de-facto standard for commercial software... more
With the mandate of light-weight working practices, iterative development, customer collaboration and incremental delivery of business values, Agile software development methods have become the de-facto standard for commercial software development, worldwide. Consequently, this research aims to empirically investigate the preparedness and the adoption of agile practices in the prominent software companies in Bangladesh. To achieve this goal, an extensive survey with 16 established software companies in Bangladesh is carried out. Results exhibit that the Scrum agile methodology is the highest practiced one. Alongside, to a great extent these software companies have the readiness to effectively adopt the Scrum methodology. However, with regard to practicing the Scrum principles, they fall short in many key aspects.
Security management, security risk management and security service evaluation involve deciding on a security strategy and an appropriate set of security solutions to align with the strategy. However, as there are limited budget, time and... more
Security management, security risk management and security service evaluation involve deciding on a security strategy and an appropriate set of security solutions to align with the strategy. However, as there are limited budget, time and resources available to identify, select, employ, monitor, review and maintain the set of security solutions, multiple perspectives must be taken into consideration in the decision making process. One important factor for constructing effective security solution decision is to make the decision dynamic. The nature of security risk changes day by day. As time passes old risks may go away and new risks may arise. So it is necessary to make the security decision in such a way that it can keep pace with the frequently changing security risks. The security solution decision must be satisfied with the demand of changing circumstances due to changing in time and changing in technologies so that decision maker can maintain an acceptable risk level and demolish the undesirable effect of uncertainty by providing improved risk assessment and management activities. Real Option Analysis (ROA) can be seen as a promising alternative to offer effective and dynamic security solution decision making process. It offers possibilities to improve decision making in security solution decision. This paper investigates how ROA could be used to assist in security solution decisions by integrating ROA with Security Decision Making Process (SDMP) which facilitates any organization to achieve better business continuity plan. Later the framework is tested through a simulation example. Real option thinking has been applied to several software designs and engineering concepts, such as eXtreme Programming (XP), COTS-based development, project investment analysis, decision making in software prototyping and strategic software reuse. Comparing with the software engineering issues, planning a security solution decision through ROA includes more uncertainties.
Static password is no more considered as a secure alternative to attain the authentication of the valid user in the internet world. This already opens the door for the attackers to compromise the password because of several vulnerable... more
Static password is no more considered as a secure alternative to attain the authentication of the valid user in the internet world. This already opens the door for the attackers to compromise the password because of several vulnerable security attacks. Thus, it needs a secure mechanism which introduces the concept of OTP where password is frequently changed and valid for a certain period. The concept makes the OTP a strong alternative of static password that is widely used now a day. However, now smart phone is convenient and commonly used media to receive OTP generated by the system which is threatened by the man-in-themiddle attack if the channel for transferring the OTP to the user end is not protected. Bearing this shortcoming of existing OTP system, we develop a method where the user will perform a certain intermediate mathematical calculation before using the OTP received by the smart phone and thus, incorporates an extra layer of security in the existing OTP system. This extra layer of security protects the method from usual security attacks whether the channel used for transferring OTP is compromised or not. This new method of OTP has noticeable improvements in performance over the existing system and puts no extra burden in the server-side verification process.