Posts

Showing posts from September, 2020

New Post

Intelligent Traffic Management Using || AI & Metaheuristics || ~xRay Pixy

Image
Hybrid Artificial Intelligence and Metaheuristics for Smart City TRafci Management Problem Video Chapters: 00:00 Introduction 00:40 Smart Cities 01:14 Traditional Methods for Traffic Management 02:12 Hybrid Approach AI and Metaheuristics 02:47 STEPS for Hybrid  Traffic Management System 08:40 Advantages of Smart Traffic Management System 09:33 Conclusion

Viewing Pipeline - 2 Dimensional Viewing in Computer Graphics

Image
 Viewing Pipeline: Viewing Transformation in several steps: 1. Modeling Coordinates 2. World Coordinate System 3. Clipping Window 4. Normalize - Normalized Coordinates  5. Device Coordinate  6. ViewPort 7. Clipping First, we construct the scene in the world coordinates using the output primitives. Next, obtain a particular orientation for the window, we can set up a 2D viewing coordinate plane and define windows in the viewing coordinate system. The viewing coordinate reference frame is used to provide a method for setting up arbitrary orientations for a rectangular window.  Once the viewing reference frame is established. we can transform description in the world coordinate to viewing coordinates. After that define a viewport in normalized coordinates ( in the range from 0 to 1). 2D Viewing Pipeline can be achieved by the following steps:  1. Construct world coordinate scene using modeling coordinate transformation.  2. convert world coordinates to viewing coordinates. 3. Transform v

Security Issues in Cloud Computing

1. Account Hijacking  Attackers can access user accounts remotely. Attackers can access data stored on the cloud. Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].  2. Insider threat An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as  Customer accounts, Financial forms, and other sensitive information. 3. Phishing and social engineering attacks Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere. 4. Malware injection Malware Injection means Code or Scripts embedded into cloud services.  Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves. 5. Security issues faced

What is a meta heuristic algorithm for?

  Metaheuristic  means a High-level problem-independent algorithmic framework that is developed for the optimization algorithm. Metaheuristic algorithms  find the best solution out of all possible solutions of an optimization. I discussed some Meta-heuristic algorithm like: Grey Wolf Optimization (GWO) Algorithm:  GWO is a metaheuristic proposed by Mirjaliali Mohammad and Lewis, 2014. GWO is inspired by the social hierarchy and the hunting technique of Grey Wolves Bat Algorithm:  The  Bat algorithm  is a metaheuristic algorithm for global optimization. It was inspired by the echolocation behavior of microbats. Cuckoo Search Algorithm: Cuckoo Search is a n ature-inspired  algorithm , based on the brood reproductive strategy of cuckoo birds to increase their population. Meta-heuristic Algorithms

Cloud Computing Components and Cloud Services

Cloud Computing includes Several elements like: Clients Datacenters Distributed servers Each component has a Purpose and plays a specific role in delivering a functional Cloud-based application.  1. Clients: C lients are typically computers. Clients are devices that end-users interact with to manage their information on Cloud.  For example Laptops, Mobiles Phones,  Tablets  Note: because of their mobility they are big drivers for Cloud computing.  2. Datacenter means the Collection of Servers. W here the application to which you subscribe is housed. A growing trend in the IT world is VIRTUALIZING servers. Multiple Virtual servers running on one physical server. 3. Distributed servers mean Large networks have Multiple servers. Servers are in geographically disparate locations. It provides more flexibility and security to the service providers.  For example, Amazon has its own Cloud solution in servers all over the world.  Services in Cloud Computin g is the concept of being able to use

Monoalphabetic Substitution Cipher Techniques

Image
  Monoalphabetic Substitution Cipher, also known as a simple substitution cipher, relies (depends) on a fixed replacement structure. That is substitution is fixed for each letter of the alphabet.  A simple example is where each letter is encrypted as the next letter in the alphabet: "a simple message" becomes "B TJNQMF NFTTBHF". Each letter can be encrypted to any symbol [&,%,?,/,*,{},@,~,+,-] not just another letter. 1.) Additive Cipher The Simplest Monoalphabetic cipher is an Additive cipher. This cipher is sometimes called Shift Cipher. When the Cipher is Additive, the Plain Text, Cipher Text and key are integers in Z(26). For Encryption: C = (p + k) mod 26 For Decryption: P = (c - k) mod 26 Where, C = Cipher Text                   P = Plain Text                   k = Key  The secret key between Alice and Bob is also an integer value. The encryption Algorithm adds the key to the Plain text character. Decryption Algorithm Subtract the key from the ciphertext c
More posts