motbanner.jpg

Computing the Burrows-Wheeler transform of a string and its reverse in parallel

The contribution of this article is twofold. First, we provide new theoretical insights into the relationship between a string and its reverse: If the Burrows-Wheeler transform (BWT) of a string has been computed by sorting its suffixes, then the BWT, the suffix array, and the longest common prefix array of the reverse string can be derived from it without suffix sorting. Furthermore, we show that the longest common prefix arrays of a string and its reverse are permutations of each other. Second, we provide a parallel algorithm that, given the BWT of a string, computes the BWT of its reverse

Software and Communications

News auto-tagging using Wikipedia

This paper presents an efficient method for automatically annotating Arabic news stories with tags using Wikipedia. The idea of the system is to use Wikipedia article names, properties, and re-directs to build a pool of meaningful tags. Sophisticated and efficient matching methods are then used to detect text fragments in input news stories that correspond to entries in the constructed tag pool. Generated tags represent real life entities or concepts such as the names of popular places, known organizations, celebrities, etc. These tags can be used indirectly by a news site for indexing

Software and Communications

Monitoring and visualization of large WSN deployments

Recent developments in wireless sensor networks have ushered in novel ubiquitous computing applications based on distributed large-scale data acquisition and interactive interpretation. However, current WSNs suffer from lack of effective tools to support large network deployment and administration as well as unavailability of interactive visualization techniques required to explore and analyze captured sensing data, which is hindering the development of real-life WSN-based ubiquitous systems. Sensor Explorer addresses the above problems by providing modular efficient stream management engine

Software and Communications

Fault-Recovery and Robust Deadlock Control of Reconfigurable Multi-Unit Resource Allocation Systems Using Siphons

A multi-unit resource allocation system usually contains several processes and a number of resources with multiple units. Due to the competition for shared resources in these systems, deadlocks may occur. Recently, researchers have shown an increased awareness in deadlock control strategies for such a kind of systems without considering the dynamic changes such as processing failures and rework by using the Petri net paradigm. This article reports a new strategy for deadlock analysis and control in reconfigurable multi-unit resource systems (MRSs). We discuss a generalized class of Petri nets

Artificial Intelligence
Software and Communications

Security Perspective in RAMI 4.0

Cloud Computing, Internet of Things (IoT) are the main technologies contributing to the adoption of the fourth revolution in manufacturing, Industry 4.0 also known as smart manufacturing or digital manufacturing. Smart manufacturing facilitates and accelerates the process of manufacturing with the connection of all the systems related to the manufacturing process starting with the Enterprise Resource Planning (ERP) systems, the Industrial Control Systems (ICSs) which control the production line and the Cyber Physical Systems (CPSs). Before the emerging of web applications, cloud applications

Artificial Intelligence
Software and Communications

SigPloit: A New Signaling Exploitation Framework

Mobile communication networks are using signaling protocols to allow mobile users to communicate using short messages, phone calls and mobile data. Signaling protocols are also used to manage billing for operators and much more. The design flaws that signaling inherits made them vulnerable to attacks such as location tracking of subscriber, fraud, calls and SMS interception. With the high rate of these emerging attacks on telecommunication protocols there is a need to create a comprehensive penetration testing framework for signaling. In this paper, we propose a framework called Sigploit that

Software and Communications

A secure face verification system based on robust hashing and cryptography

Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which employs a user dependent one way transformation based on a two stage hashing algorithm.We first hash the face image using a two stages robust image hashing technique, then the result hash vector is encrypted using Advanced Encryption Standard (AES). Both the hashing and the encryption/decryption keys are generated from the user claimed ID, using a modified

Software and Communications

Code Smells and Detection Techniques: A Survey

Design and code smells are characteristics in the software source code that might indicate a deeper design problem. Code smells can lead to costly maintenance and quality problems, to remove these code smells, the software engineers should follow the best practices, which are the set of correct techniques which improve the software quality. Refactoring is an adequate technique to fix code smells, software refactoring modifies the internal code structure without changing its functionality and suggests the best redesign changes to be performed. Developers who apply correct refactoring sequences

Artificial Intelligence
Software and Communications

Cloud computing security: Challenges & future trends

Cloud computing is one of the most trendy terminologies. Cloud providers aim to satisfy clients' requirements for computing resources such as services, applications, networks, storage and servers. They offer the possibility of leasing these resources rather than buying them. Many popular companies, such as Amazon, Google and Microsoft, began to enhance their services and apply the technology of cloud computing to provide cloud environment for their customers. Although there are lots of advantages in using a cloud-based system, some issues must be handled before organisations and individuals

Software and Communications

NONYM!ZER: Mitigation Framework for Browser Fingerprinting

Not only recent compelled cookies regulations have radically restrained their threats but also increased people awareness has played a fundamental part. This has placed huge pressure on enterprises to find alternatives to bridge this gap and satisfy business demands. Since then fingerprinting has gained enormous popularity. In this paper, we introduce 'nonym!zer' as a mitigation framework for browser fingerprinting. It helps to hinder or impede browser fingerprinting on desktop browsers that web servers use such as WebGL or Canvas technologies. © 2019 IEEE.

Software and Communications