Traffic Simulation Using Cellular Automaton Model for Closed Loops

Abstract The project aims to demonstrate the use cellular automaton model to describe vehicular traffic on a freeway for a one lane and two-lane road. Properties of the system like the flow, critical density, average car speed and congestions have been represented under some constraints and analysed. The phenomena of stop-start waves have also been … Read more

Improving aspects of Naive Bayes Classifier

Abstract Naive Bayes (also known as Simple Bayes and Independence Bayes) classifier is a probabilistic classifier based upon Bayes’ Theorem which makes assumptions of independence between the entities at play. It assigns a particular object to the most probabilistic class that it finds it to be a suitable match for. Its performance and relevance in … Read more

Computer science questions answered

CS450 EOS 1. a) Personally, I would recommend the adoption of crypto, which is a combination of cryptocurrency and digital currency that will be integrated into future chips as security concerns grow. Perhaps an eFPGA (Embedded Field Programmable Gate Array) core will become the standard, to which any accelerator logic can be mapped. In the … Read more

Analysis of information flow system

Introduction Along with the technological advancement of recent years and due to the electronic environment of transmitting, storing and managing information in the present century, a century of speed and globalization, the issue of the security of the organization’s information system is becoming more and more common. In order to maintain the highest level of … Read more

Integrated Application for Caller-Identification System – Software Requirements Specification

1) Introduction: A Software Requirements Specification (SRS) is a description of a software system to be developed, laying out functional and non-functional requirements. Software requirements specification establishes the basis for an agreement between customers and contractors or suppliers. The software requirements specification document enlists enough and necessary requirements that are required for the project development. … Read more

International space and counterspace programs, security

While much of the technological world focuses on the advancement of artificial intelligence, another frontier is that of space based technology. Ever since the beginning of the second space age, characterized by the fall of the Soviet Union, China has began to increase its extraterrestrial presence through its expanding space and counterspace programs. It is … Read more

Genetic Algorithm For Object Oriented Software Development

Genetic algorithms (GA) have been successfully applied in development of software but GA for Object oriented software development is limited. This paper proposes a method to generate classes in object oriented software using a genetic programming approach. It uses a tree representation of statements in development. Strategies for encoding the coding and using the objective … Read more

Structure of the penetration test / concepts of the Internet of things

Abstract Penetration testing is a process to conduct a security assessment that provides the solution for the cyber environment vulnerabilities. The details of finding during the penetration testing process have followed by common ethical hacking methodologies. Cyberspace faces problems as its usage increases in this electronics world. The potential for the problems with the latest … Read more

Analysis of vulnerabilities applicable to websites and Microsoft Windows operating systems

Abstract— In order to be able to make an analysis related to vulnerabilities applicable to websites and Microsoft Windows operating systems it was needed to install Kali Linux on a virtual machine to be able to use Metasploit Framework and Burp Suite to start penetesting websites using vulnerabilities that are the most common.Vulnerabilities that are … Read more

Layered security and defense in-depth network security strategies

Introduction Since time immemorial security has been inevitable for the safe and peaceful existence of mankind. The need for security is an essential and fundamental need to for survival. Security cut across all areas of life from providing security for life to providing security for properties which are non-living things. The need for security also … Read more

Main Characteristics And Features Of Object Oriented Programming

1.1 What is Object Oriented Programming? The following task clearly explains the descriptions of the features and characteristics of the features of the object oriented programming. There are twelve principles of oop which is stated below. The Object oriented programming is one of the newest and most powerful paradigms. The Object-Oriented Programming mentions to the … Read more

Agile implementation with challenges and solutions

Abstract Software engineering is one of the most spontaneous industry which requires swiftness in response and flexibility at every phase of development. Agile methodologies provide cutting-edge products and ingenious experiences, while keeping the product in coordination with the industry approaches and customer’s unpredictable requirements. Agile makes working processes facile giving efficient outputs. This research paper … Read more

LIGHTWEIGHT CRYPTOGRAPHY

INTRODUCTION The advancement in technology leads to the reduction in size and power consumed by the devices used to perform real world operations including of which are like sensor networks, RFID Tags, controllers, smart cards and deployment of embedded system etc. The functionality of all these systems consists of storage, manipulation and transmission of some … Read more

Lightweight Cryptography for IOT – Simon & Speck algorithms in Secure Smart Home Applications

Simon & Speck algorithms in Secure Smart Home Applications 1. Introduction Embedded systems influence our lives in all of its aspects, in areas such as automotive, avionics, smart homes or wearables, from small factor devices to physically large ones, used in industrial applications. The security of computer networks is and always will be a hot … Read more