Open Access Original Research Article

Current Trend in Wireless Networks

Ali Hameed Yassir, Ali Fattah Dakhil, Waffa Muhammed Ali, Abeer Nasir Faisal

Asian Journal of Research in Computer Science, Volume 2, Issue 4, Page 1-6
DOI: 10.9734/ajrcos/2018/v2i430077

In this study, a general overview of the current trend wireless network has been presented the explosive parallel growth of both the Internet and cellular telephone services are becoming the two most important phenomena that impact the required modern feasible and secure telecommunications. A wireless service technology has become well-known in technology markets. WLAN implemented the development of the wired LAN. Industries produce the required components, which lead to the fast developments in designing and implementing of such networks. The merging of wireless network deemed to be a solution to some of the problems of the wired networks. In this survey study, we will try to discuss the advantages of wireless devices and indicate the challenges involved in this technology from the point of view of its foundation, architecture, requirements, its components, and protocols.

Open Access Original Research Article

The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

Maxwell Scale Uwadia Osagie, Amenze Joy Osagie

Asian Journal of Research in Computer Science, Volume 2, Issue 4, Page 1-8
DOI: 10.9734/ajrcos/2018/v2i430078

Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system.

Open Access Original Research Article

Algorithm 1 and Algorithm 2 for Determining the Number pi (π)

Mieczysław Szyszkowicz

Asian Journal of Research in Computer Science, Volume 2, Issue 4, Page 1-7
DOI: 10.9734/ajrcos/2018/v2i430079

Archimedes used the perimeter of inscribed and circumscribed regular polygons to obtain lower and upper bounds of π. Starting with two regular hexagons he doubled their sides from 6 to 12, 24, 48, and 96. Using the perimeters of 96 side regular polygons, Archimedes showed that 3+10/71<π<3+1/7 and his method can be realized as a recurrence formula called the Borchardt-Pfaff-Schwab algorithm. Heinrich Dörrie modified this algorithm to produce better approximations to π than these based on Archimedes’ scheme. Lower bounds generated by his modified algorithm are the same as from the method discovered earlier by cardinal Nicolaus Cusanus (XV century), and again re-discovered two hundred years later by Willebrord Snell (XVII century). Knowledge of Taylor series of the functions used in these methods allows to develop new algorithms. Realizing Richardson’s extrapolation, it is possible to increase the accuracy of the constructed methods by eliminating some terms in their series. Two new methods are presented. An approximation of squaring the circle with high accuracy is proposed.

Open Access Original Research Article

A Robust and Efficient System to Detect Human Faces Based on Facial Features

Abdelmgeid A. Ali, Tarek Abd El-Hafeez, Yosra Khalaf Mohany

Asian Journal of Research in Computer Science, Volume 2, Issue 4, Page 1-12
DOI: 10.9734/ajrcos/2018/v2i430080

Face detection is considered as a one of the most important issues in the identification and authentication systems which use biometric features. Face detection is not straightforward as long as it has lots of dissimilarity of image appearance. Some challenges are required to be resolved to improve the detection process. These challenges include environmental constraints, device specific constraints and the facial feature constraints. Here in our paper we present a modified method to enrich face detection by using combination of Haar cascade files using skin detection, eye detection and nose detection. Our proposed system has been evaluated using Wild database. The experimental results have shown that the proposed system can achieve accuracy of detection up to 96%. Also, here we compared the proposed system with the other face detection systems and the success rate of the proposed system is better than the considered systems.

Open Access Original Research Article

Posture Invariant Personal Identification System Using Convex Hulls: Ear Biometrics

M. A. Jayaram, G. K. Prashanth

Asian Journal of Research in Computer Science, Volume 2, Issue 4, Page 1-18
DOI: 10.9734/ajrcos/2018/v2i430081

Aims: In this work we have set forth two aims, i. to find a unique methodology to capture the shape of human ears using convex hulls and ii. to develop a rotation invariant personal identification system

Study Design: Application of convex hulls to capture the shape of the human ear in a precise manner.

Place and Duration of Study: Research Center, Department of Master of Computer Applications, Siddaganga Institute of Technology, Tumakuru, India, between June 2014 and July 2018.

Methodology: The work focused in this part is about using convex hulls for capturing the ear shape to utmost accuracy in two different orientations: i. orientation with respect to plane of the ear which accounted for rotation and ii. Orientation with respect to perpendicular axis through the ear plane which accounted for tilting. In order to meet the objective of developing a rotation invariant personal identification system. Thirteen parameters namely area, aspect ratio, bari centric coordinate, convexity, concavity, eccentricity, circular equi-diameter, Euler number, faret’s diameter, form factor, orientation, perimeter and solidity were considered.

Results: The system was checked by conducting identification experiments. The recognition rate of 100%, 95%, 85% and 77% was noticed for 00, 22.50, 450, 67.50 orientations respectively when Euclidean distance matching criteria was implemented. Apart from this, similarity measures were also considered for matching test image with template image. In this connection Cosine, Jaccard and Dice similarity measures were used. Cosine similarity measure showed relatively higher recognition rates of 84%, 82%, 75.6% and 74.6% for 00, 22.50, 450, and 67.50 orientations respectively. Similarly Jaccard similarity measure performed with 78%, 75.25%, 74.25% and 72.8% for the four orientations respectively. Dice similarity measure exhibited 75%, 73%, 68% and 72% for the four orientations respectively. The overlapping similarity measure showed a drastic behavior by arriving at only two groups and with reduced recognition rates of 72%, 69%, 67% and 64% respectively.

Conclusion: It is concluded that the outcome of the research would be of immense help to the research community in the realm of ear biometrics. In addition, the contribution of head posture invariant person recognition system will definitely inspire the research community as well as the developers of biometric systems to explore the area of ear biometric related personal identification system.