Posts

New Post

Intelligent Traffic Management Using || AI & Metaheuristics || ~xRay Pixy

Image
Hybrid Artificial Intelligence and Metaheuristics for Smart City TRafci Management Problem Video Chapters: 00:00 Introduction 00:40 Smart Cities 01:14 Traditional Methods for Traffic Management 02:12 Hybrid Approach AI and Metaheuristics 02:47 STEPS for Hybrid  Traffic Management System 08:40 Advantages of Smart Traffic Management System 09:33 Conclusion

Security Issues in Cloud Computing

1. Account Hijacking  Attackers can access user accounts remotely. Attackers can access data stored on the cloud. Methods of Hijacking: Reused Password and Scripting Bugs [in April 2010 Amazon faced crossed-site scripting bug].  2. Insider threat An Attack from inside your organization [Business Partnership]. Employees can use their authorized access to an organization’s cloud-based services. Employees can misuse or access information such as  Customer accounts, Financial forms, and other sensitive information. 3. Phishing and social engineering attacks Once login information or other confidential information is available. A malicious user can log into a system easily as the system is accessible from anywhere. 4. Malware injection Malware Injection means Code or Scripts embedded into cloud services.  Malicious code can be injected into cloud services. Injected code is viewed as part of the software or service that is running within the cloud servers themselves. 5. Security issues faced

What is a meta heuristic algorithm for?

  Metaheuristic  means a High-level problem-independent algorithmic framework that is developed for the optimization algorithm. Metaheuristic algorithms  find the best solution out of all possible solutions of an optimization. I discussed some Meta-heuristic algorithm like: Grey Wolf Optimization (GWO) Algorithm:  GWO is a metaheuristic proposed by Mirjaliali Mohammad and Lewis, 2014. GWO is inspired by the social hierarchy and the hunting technique of Grey Wolves Bat Algorithm:  The  Bat algorithm  is a metaheuristic algorithm for global optimization. It was inspired by the echolocation behavior of microbats. Cuckoo Search Algorithm: Cuckoo Search is a n ature-inspired  algorithm , based on the brood reproductive strategy of cuckoo birds to increase their population. Meta-heuristic Algorithms

Cloud Computing Components and Cloud Services

Cloud Computing includes Several elements like: Clients Datacenters Distributed servers Each component has a Purpose and plays a specific role in delivering a functional Cloud-based application.  1. Clients: C lients are typically computers. Clients are devices that end-users interact with to manage their information on Cloud.  For example Laptops, Mobiles Phones,  Tablets  Note: because of their mobility they are big drivers for Cloud computing.  2. Datacenter means the Collection of Servers. W here the application to which you subscribe is housed. A growing trend in the IT world is VIRTUALIZING servers. Multiple Virtual servers running on one physical server. 3. Distributed servers mean Large networks have Multiple servers. Servers are in geographically disparate locations. It provides more flexibility and security to the service providers.  For example, Amazon has its own Cloud solution in servers all over the world.  Services in Cloud Computin g is the concept of being able to use

Monoalphabetic Substitution Cipher Techniques

Image
  Monoalphabetic Substitution Cipher, also known as a simple substitution cipher, relies (depends) on a fixed replacement structure. That is substitution is fixed for each letter of the alphabet.  A simple example is where each letter is encrypted as the next letter in the alphabet: "a simple message" becomes "B TJNQMF NFTTBHF". Each letter can be encrypted to any symbol [&,%,?,/,*,{},@,~,+,-] not just another letter. 1.) Additive Cipher The Simplest Monoalphabetic cipher is an Additive cipher. This cipher is sometimes called Shift Cipher. When the Cipher is Additive, the Plain Text, Cipher Text and key are integers in Z(26). For Encryption: C = (p + k) mod 26 For Decryption: P = (c - k) mod 26 Where, C = Cipher Text                   P = Plain Text                   k = Key  The secret key between Alice and Bob is also an integer value. The encryption Algorithm adds the key to the Plain text character. Decryption Algorithm Subtract the key from the ciphertext c
More posts