IJMSC Vol. 5, No. 3, Jul. 2019
Cover page and Table of Contents: PDF (size: 1046KB)
In this paper, a numerical method which produces an approximate solution is presented for the numerical solutions of sixth,eighth,ninth and twelfth order boundary value problems. With the aid of derivatives of power series which slightly perturbe and collocate, eventually converts boundary value problems into the square matrix equations with the unknown coefficients obtain using MAPLE 18 software. This method gives the approximate solutions and compare with the exact solutions. Finally, some examples and their numerical solutions are given by comparing the numerical results obtained to other methods available in the literature, show a good agreement and efficiency.[...] Read more.
In this paper, we analyze the pattern formation in a chemical reaction-diffusion Brusselator model. Twocomponent Brusselator model in two spatial dimensions is studied numerically through direct partial differential equation simulation and we find a periodic pattern. In order to understand the periodic pattern, it is important to investigate our model in one-dimensional space. However, direct partial differential equation simulation in one dimension of the model is performed and we get periodic traveling wave solutions of the model. Then, the local dynamics of the model is investigated to show the existence of the limit cycle solutions. After that, we establish the existence of periodic traveling wave solutions of the model through the continuation method and finally, we get a good consistency among the results.[...] Read more.
A new approach for the generation of randomized substitution box (S-box) based on the concept of a redesign of S-box with fewer numbers of input bits processed at a time as compared to existing S-box in Data Encryption Standard (DES) Algorithm. The results of experimentation prove that proposed randomized approach also generate promising results, which can be particularly useful for devices with less processing power. Proposed approach retains the diffusion and confusion property of a good cryptosystem algorithm.[...] Read more.
In general, subspace clustering algorithms identify enormously large number of subspace clusters which may possibly involve redundant clusters. This paper presents Dynamic Epsilon based Maximal Subspace Clustering Algorithm (DEMSC) that handles both redundancy and inter-subspace density divergence, a phenomenon in density based subspace clustering. The proposed algorithm aims to mine maximal and non-redundant subspace clusters. A maximal subspace cluster is defined by a group of similar data objects that share maximal number of attributes. The DEMSC algorithm consists of four steps. In the first step, data points are assigned with random unique positive integers called labels. In the second step, dense units are identified based on the density notion using proposed dynamically computed epsilon-radius specific to each subspace separately and user specified input parameter minimum points, τ. In the third step, sum of the labels of each data object forming the dense unit is calculated to compute its signature and is hashed into the hash table. Finally, if a dense unit of a particular subspace collides with that of the other subspace in the hash table, then both the dense units exists with high probability in the subspace formed by combining the colliding subspaces. With this approach efficient maximal subspace clusters which are non-redundant are identified and outperforms the existing algorithms in terms of cluster quality and number of the resulted subspace clusters when experimented on different benchmark datasets.[...] Read more.
Adversaries to any system restlessly continues to sought effective, non-detectable means to aid them successful penetrate secure systems, either for fun or commercial gains. They achieve these feats easily through the use of malware, which keeps on the rise, an ever-growing and corresponding overpopulated malware zoo. As such, information technology industry will continue to encounter via these escapades, both monetary and prestigious losses. Malware by design aims to alter the behaviour of its host by self-replicating its genome or codes unto it. They are quite fascinating in that on execution, some malware change their own structure so that its copies have same functionality but differ in signature and syntax from the original or parent virus. This makes signature detection quite unreliable. Study investigates detection of metamorphic malware attacks using the Boyer Moore algorithm for string-based signature detection scheme.[...] Read more.