tasneem rehman - Academia.edu (original) (raw)
Papers by tasneem rehman
Multimedia Tools and Applications, Sep 15, 2023
In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collect... more In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collecting and analyzing data or information by identifying the behavior of the user or predicting the attacks by the automatic response. So, in this paper, the Blockchain-based African Buffalo (BbAB) scheme with Recurrent Neural Network (RNN) model is proposed for detecting the intrusion by enhancing security. Furthermore, normal and malware user datasets are collected and trained in the system and the dataset is encrypted using Identity Based Encryption (IBE). The encrypted data are securely stored in the blockchain in the cloud. Hereafter, Recurrent Neural Network (RNN) was employed to detect the intrusion in a cloud environment. African buffalo optimization was used in the RNN prediction phase for continuous monitoring of intrusion. Finally, the performance results of the developed technique are compared with other conventional models in terms of accuracy, precision, recall, F1-score, and detection rate. The outperformance of the designed model attains better accuracy of 99.87% and high recall of 99.92%.it shows the efficiency of the designed model to protect data and security in cloud computing.
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET), Dec 23, 2022
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
Software development methodologies offer a methodical way to working on projects in accordance wi... more Software development methodologies offer a methodical way to working on projects in accordance with client expectations. In the software development process, the customer is seen as the main entity. In order to build valuable software quickly and within a given budget, firms are now seeking to implement customer-centric techniques. Customer satisfaction plays a crucial part in the development and deployment of software products. One software development process that helps to best fulfil changing customer requirements is agile software development. In the following part, a table of comparisons between the various agile modelling methodologies with regard to requirements and the role of the customer follows a discussion of agile methodology. The Scrum & Extreme Programming framework is presented, along with how different firms use the approach for projects of various sizes.
International Journal of Computer Science and Engineering
International Journal of Computer Science and Engineering
Vulnerability assessment and penetration testing is a process done at every level in cyber securi... more Vulnerability assessment and penetration testing is a process done at every level in cyber security due to various attacks regularly and the problems created by the attackers either for personal or professional reasons. on the other hand, Exploits are the main asset of Vulnerabilities. This paper aims to classify the exploits based on their existence. Also, this paper tries to give a fair judgment to review Vulnerability Assessment and Penetration Testing with Exploits. Along with some awareness and prevention techniques. A study on preventive and defensive measures could be taken from the view of any Penetration Tester. Detailed Classification of Exploits and their existence is the main aspect of this paper.
Design Engineering, Oct 23, 2021
This paper describes the method for hiding data in a secure manner. The technique used for this p... more This paper describes the method for hiding data in a secure manner. The technique used for this purpose is Steganography. Here Video is used as medium for carrying secret messages. Video Steganography is a method for hiding data in a video file. A Novel Video Steganography technique has been proposed in this paper, which can be used with multiple types of cover format(.mov,.mts,.flv,.mpeg). The secret message also can be of any type like text, audio, video and image. The security is achieved by combining encryption, compression and Embedding technique altogether. The problem with existing video steganography technique is that they have work only on .AVI files and only single data format i.e. text or image. After studying the literature related to steganography it is observed that the techniques/methods available for Video Steganography lack support for versatility with respect to its cover file format and data file format. The amount of data the cover file can carry is also limited and security layers are not added effectively which results in insecure communication.
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017
Computing has changed the way humans solve problems. It has changed the world more than any other... more Computing has changed the way humans solve problems. It has changed the world more than any other innovation in the recent past. Over the last couple of years, there has been an increased interest in utilizing computing processor powers to its maximum. Cloud, cluster and grid computing are the most common types of computing. All these share some common features toward achieving utility although marginal differences exist in their processes and approaches. The paper presents the relationship and the differences of grid computing from cloud computing in terms of their architecture, applications, security and tools.
Applied Nanoscience, 2021
Coronary artery disease, which involves a wide range of conditions, including narrowed or blocked... more Coronary artery disease, which involves a wide range of conditions, including narrowed or blocked coronary arteries, has remained the leading cause of death in the United States for over 50 years. The majority of cardiovascular disorders are preventable, which are identified through risk factors. Electrocardiogram (ECG), a routinely available test that provides information about one’s electrophysiologic health, may be beneficial in determining cardiovascular risk. Given the automated and highly correlated nature of its measurements, ECG data are suited well for analysis via machine learning. This research compares and demonstrates the improvements over standard methods for the discussed framework. The proposed framework demonstrates a novel approach to determine the severity of heart diseases using a traditional survival analysis and machine learning methods based on the blockages of major blood vessels in the heart. Hence, modern research demands to improve the accuracy of the predictive analysis. This work analyses the widespread predictive determination using various machine learning methods of heart disease and applies a cost-based matrix to enhance detection accuracy. An HD dataset to evaluate the classification performance following the classification algorithms.
International Journal of Advanced Computer Science and Applications, 2020
Scalability is an utter compulsory for the success of the IoT's unprecedentedly growing network. ... more Scalability is an utter compulsory for the success of the IoT's unprecedentedly growing network. The operational and financial bottlenecks allied with growth can be overwhelming for those peeping to integrate IoT solutions. As the IoT technology proceeds, so is the scale of operations desired to arrive at a wider target region. Breakdown may take place not because of device's ability to scale, but due to data scale. As more devices are being incorporated, more data/information will be amassed, stored, processed, and scrutinized. The volume of this collection simply cannot be managed from a single edge device by deploying vertical approach. When starting small, it's important to peep into the future and anticipate growth. Companies that can't adapt to unpredictable market changes will fold without the right IoT architecture in place. Therefore, a scalable IOT framework has been proposed in the paper, which will provide load balancing or scalability by deploying the provisions of horizontal scalability for the system. The framework will be utilizing SOM for the purpose of classifying applications (whether delay sensitive or delay insensitive), so that proper decisions can be made based on the incoming data (typically signals) and if edge gets over flooded with the data, then edge is scaled to instigate the other edge for computing additional requests. The proposed system is termed as intelligent because its algorithm empowers the edge to take decision and classify applications based on the type of requirement of the application.
International Journal of Computer Science & Engineering Survey, 2010
Broadcasting is a fundamental operation in MANETs where a source node transmits a message that is... more Broadcasting is a fundamental operation in MANETs where a source node transmits a message that is to be disseminated to all the nodes in the network. Broadcasting is categorized into deterministic and probabilistic schemes. This paper reviews the probabilistic broadcasting protocol because of its adaptability in changing environment. Probabilistic broadcasting is best suited in terms of ad hoc network which is well known for its decentralized network nature. Probability, counter and distance based scheme under probabilistic scheme are discussed in this paper. Besides the basic probability scheme this paper also includes their recent advancements. Rebroadcast is one of the initial task for route discovery in reactive protocols. This review paper identify which protocol gives better performance in terms of reachability, saved rebroadcast and average latency in rebroadcasting a route request message. Simulation results are presented, which shows reachability, saved rebroadcast and average latency of the probabilistic broadcast protocols and their enhancement schemes. The comparative study shows the improvement of enhanced scheme over probabilistic schemes.
International Journal of Advanced Computer Science and Applications, 2012
An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method... more An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destination is established. Thus, this leads to broadcast storm problem. This paper presents a novel algorithm for broadcasting scheme in wireless ad hoc networks using a fuzzy logic system at each node to determine its capability to broadcast route request packets, based on the node location. Our simulation analysis shows a significant improvement in performance in terms of routing overhead, MAC collisions and end-to-end delay while still achieving a good throughput compared to the traditional AODV.
Journal of Intelligent & Fuzzy Systems, 2014
ABSTRACT Abstract. An ad-hoc network consists of hosts (mobile or static) and each node can direc... more ABSTRACT Abstract. An ad-hoc network consists of hosts (mobile or static) and each node can directly communicate with its neighbours lying within the nodes transmission range. In a mobile ad hoc network the most common operation is broadcasting. Broadcasting means sending a message from one given node to all the nodes in the network. In MANET, broadcasting results in a network with redundancy, contention, collision which is often called “Broadcast Storm Problem”. There are number of broadcasting schemes that have been developed and the main objective of broadcasting scheme is to avoid the broadcast storm problem and provide better reachability with minimum overheads. Existing probabilistic broadcast schemes have focused on pure broadcast scenarios with investigations on only a single node parameter either node density or node location, which results in their limited performance. In this paper, the probability of broadcast is determined by considering node density, node location and node remaining battery power. The proposed probabilistic broadcasting scheme takes into account three node parameters to generate the probability to rebroadcast. As the probability to rebroadcast is calculated based on the multiple node parameter, there is a need of an optimization technique. The Fuzzy Logic optimization technique has the ability to simultaneously consider multiple criteria and to model human experience in the form of simple rules. The developed Fuzzy Based probabilistic broadcasting scheme reduces redundant rebroadcasting by minimizing the number of rebroadcasting nodes. To evaluate the performance of developed algorithm it has been implemented on Qualnet with fuzzy logic embedded on it.
Multimedia Tools and Applications, Sep 15, 2023
In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collect... more In recent years, Intrusion Detection Systems (IDS) monitor the computer network system by collecting and analyzing data or information by identifying the behavior of the user or predicting the attacks by the automatic response. So, in this paper, the Blockchain-based African Buffalo (BbAB) scheme with Recurrent Neural Network (RNN) model is proposed for detecting the intrusion by enhancing security. Furthermore, normal and malware user datasets are collected and trained in the system and the dataset is encrypted using Identity Based Encryption (IBE). The encrypted data are securely stored in the blockchain in the cloud. Hereafter, Recurrent Neural Network (RNN) was employed to detect the intrusion in a cloud environment. African buffalo optimization was used in the RNN prediction phase for continuous monitoring of intrusion. Finally, the performance results of the developed technique are compared with other conventional models in terms of accuracy, precision, recall, F1-score, and detection rate. The outperformance of the designed model attains better accuracy of 99.87% and high recall of 99.92%.it shows the efficiency of the designed model to protect data and security in cloud computing.
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET), Dec 23, 2022
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
2022 IEEE International Conference on Current Development in Engineering and Technology (CCET)
Software development methodologies offer a methodical way to working on projects in accordance wi... more Software development methodologies offer a methodical way to working on projects in accordance with client expectations. In the software development process, the customer is seen as the main entity. In order to build valuable software quickly and within a given budget, firms are now seeking to implement customer-centric techniques. Customer satisfaction plays a crucial part in the development and deployment of software products. One software development process that helps to best fulfil changing customer requirements is agile software development. In the following part, a table of comparisons between the various agile modelling methodologies with regard to requirements and the role of the customer follows a discussion of agile methodology. The Scrum & Extreme Programming framework is presented, along with how different firms use the approach for projects of various sizes.
International Journal of Computer Science and Engineering
International Journal of Computer Science and Engineering
Vulnerability assessment and penetration testing is a process done at every level in cyber securi... more Vulnerability assessment and penetration testing is a process done at every level in cyber security due to various attacks regularly and the problems created by the attackers either for personal or professional reasons. on the other hand, Exploits are the main asset of Vulnerabilities. This paper aims to classify the exploits based on their existence. Also, this paper tries to give a fair judgment to review Vulnerability Assessment and Penetration Testing with Exploits. Along with some awareness and prevention techniques. A study on preventive and defensive measures could be taken from the view of any Penetration Tester. Detailed Classification of Exploits and their existence is the main aspect of this paper.
Design Engineering, Oct 23, 2021
This paper describes the method for hiding data in a secure manner. The technique used for this p... more This paper describes the method for hiding data in a secure manner. The technique used for this purpose is Steganography. Here Video is used as medium for carrying secret messages. Video Steganography is a method for hiding data in a video file. A Novel Video Steganography technique has been proposed in this paper, which can be used with multiple types of cover format(.mov,.mts,.flv,.mpeg). The secret message also can be of any type like text, audio, video and image. The security is achieved by combining encryption, compression and Embedding technique altogether. The problem with existing video steganography technique is that they have work only on .AVI files and only single data format i.e. text or image. After studying the literature related to steganography it is observed that the techniques/methods available for Video Steganography lack support for versatility with respect to its cover file format and data file format. The amount of data the cover file can carry is also limited and security layers are not added effectively which results in insecure communication.
2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE), 2017
Computing has changed the way humans solve problems. It has changed the world more than any other... more Computing has changed the way humans solve problems. It has changed the world more than any other innovation in the recent past. Over the last couple of years, there has been an increased interest in utilizing computing processor powers to its maximum. Cloud, cluster and grid computing are the most common types of computing. All these share some common features toward achieving utility although marginal differences exist in their processes and approaches. The paper presents the relationship and the differences of grid computing from cloud computing in terms of their architecture, applications, security and tools.
Applied Nanoscience, 2021
Coronary artery disease, which involves a wide range of conditions, including narrowed or blocked... more Coronary artery disease, which involves a wide range of conditions, including narrowed or blocked coronary arteries, has remained the leading cause of death in the United States for over 50 years. The majority of cardiovascular disorders are preventable, which are identified through risk factors. Electrocardiogram (ECG), a routinely available test that provides information about one’s electrophysiologic health, may be beneficial in determining cardiovascular risk. Given the automated and highly correlated nature of its measurements, ECG data are suited well for analysis via machine learning. This research compares and demonstrates the improvements over standard methods for the discussed framework. The proposed framework demonstrates a novel approach to determine the severity of heart diseases using a traditional survival analysis and machine learning methods based on the blockages of major blood vessels in the heart. Hence, modern research demands to improve the accuracy of the predictive analysis. This work analyses the widespread predictive determination using various machine learning methods of heart disease and applies a cost-based matrix to enhance detection accuracy. An HD dataset to evaluate the classification performance following the classification algorithms.
International Journal of Advanced Computer Science and Applications, 2020
Scalability is an utter compulsory for the success of the IoT's unprecedentedly growing network. ... more Scalability is an utter compulsory for the success of the IoT's unprecedentedly growing network. The operational and financial bottlenecks allied with growth can be overwhelming for those peeping to integrate IoT solutions. As the IoT technology proceeds, so is the scale of operations desired to arrive at a wider target region. Breakdown may take place not because of device's ability to scale, but due to data scale. As more devices are being incorporated, more data/information will be amassed, stored, processed, and scrutinized. The volume of this collection simply cannot be managed from a single edge device by deploying vertical approach. When starting small, it's important to peep into the future and anticipate growth. Companies that can't adapt to unpredictable market changes will fold without the right IoT architecture in place. Therefore, a scalable IOT framework has been proposed in the paper, which will provide load balancing or scalability by deploying the provisions of horizontal scalability for the system. The framework will be utilizing SOM for the purpose of classifying applications (whether delay sensitive or delay insensitive), so that proper decisions can be made based on the incoming data (typically signals) and if edge gets over flooded with the data, then edge is scaled to instigate the other edge for computing additional requests. The proposed system is termed as intelligent because its algorithm empowers the edge to take decision and classify applications based on the type of requirement of the application.
International Journal of Computer Science & Engineering Survey, 2010
Broadcasting is a fundamental operation in MANETs where a source node transmits a message that is... more Broadcasting is a fundamental operation in MANETs where a source node transmits a message that is to be disseminated to all the nodes in the network. Broadcasting is categorized into deterministic and probabilistic schemes. This paper reviews the probabilistic broadcasting protocol because of its adaptability in changing environment. Probabilistic broadcasting is best suited in terms of ad hoc network which is well known for its decentralized network nature. Probability, counter and distance based scheme under probabilistic scheme are discussed in this paper. Besides the basic probability scheme this paper also includes their recent advancements. Rebroadcast is one of the initial task for route discovery in reactive protocols. This review paper identify which protocol gives better performance in terms of reachability, saved rebroadcast and average latency in rebroadcasting a route request message. Simulation results are presented, which shows reachability, saved rebroadcast and average latency of the probabilistic broadcast protocols and their enhancement schemes. The comparative study shows the improvement of enhanced scheme over probabilistic schemes.
International Journal of Advanced Computer Science and Applications, 2012
An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method... more An on-demand route discovery method in mobile ad hoc networks (MANET) uses simple flooding method, whereas a mobile node blindly rebroadcasts received route request (RREQ) packets until a route to a particular destination is established. Thus, this leads to broadcast storm problem. This paper presents a novel algorithm for broadcasting scheme in wireless ad hoc networks using a fuzzy logic system at each node to determine its capability to broadcast route request packets, based on the node location. Our simulation analysis shows a significant improvement in performance in terms of routing overhead, MAC collisions and end-to-end delay while still achieving a good throughput compared to the traditional AODV.
Journal of Intelligent & Fuzzy Systems, 2014
ABSTRACT Abstract. An ad-hoc network consists of hosts (mobile or static) and each node can direc... more ABSTRACT Abstract. An ad-hoc network consists of hosts (mobile or static) and each node can directly communicate with its neighbours lying within the nodes transmission range. In a mobile ad hoc network the most common operation is broadcasting. Broadcasting means sending a message from one given node to all the nodes in the network. In MANET, broadcasting results in a network with redundancy, contention, collision which is often called “Broadcast Storm Problem”. There are number of broadcasting schemes that have been developed and the main objective of broadcasting scheme is to avoid the broadcast storm problem and provide better reachability with minimum overheads. Existing probabilistic broadcast schemes have focused on pure broadcast scenarios with investigations on only a single node parameter either node density or node location, which results in their limited performance. In this paper, the probability of broadcast is determined by considering node density, node location and node remaining battery power. The proposed probabilistic broadcasting scheme takes into account three node parameters to generate the probability to rebroadcast. As the probability to rebroadcast is calculated based on the multiple node parameter, there is a need of an optimization technique. The Fuzzy Logic optimization technique has the ability to simultaneously consider multiple criteria and to model human experience in the form of simple rules. The developed Fuzzy Based probabilistic broadcasting scheme reduces redundant rebroadcasting by minimizing the number of rebroadcasting nodes. To evaluate the performance of developed algorithm it has been implemented on Qualnet with fuzzy logic embedded on it.