Volume-14 ~ Issue-6
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Mobile agent technology has grown in acceptance over the years for distributed applications, but it is yet to be adopted as ubiquitous solution technique. This is due to its complexity and lack of interoperability. Mobile agent executes on mobile agent platform, these platforms from different vendors are design, and language specific, and are thus non interoperable. In other words mobile agent built on one platform cannot interact with or execute on any other platform. There is a need to provide a common base on which agents from different vendors can interact and interoperate. This work presents a framework for mobile agent interoperability by providing an Embedded Mobile Agent (EMA) system into the Windows Operating System kernel so that it can run as a service; this was done to eliminate the overheads associated with the agent platforms and enhance mobile agents' interoperability. The targeted OS were Windows XP, Windows Vista and Windows7.
Keywords: embedded mobile agent, interoperability, mobile agent platform, operating system service.
[1] Lange D. B. 1998. Mobile objects and mobile agents: the future of distributed computing? Proceedings of the European Conference on Object-Oriented Programming (ECOOP‟98), 1998.
[2] Aderounmu, G. A. 2001 Development of an intelligent mobile agent for computer network performance management. Unpublished PhD thesis, Department of Computer Science and Engineering, Obafemi Awolowo University, Ile-Ife, Nigeria.
[3] Biermann E. 2004. A Framework for the Protection of Mobile Agents Against Malicious Hosts. Unpublished Ph.D thesis, University of South Africa, South Africa.
[4] Outtagarts Abdelkader (2009). "Mobile Agent-Based Applications: A Survey." International Journal of Computer Science and Network Security, 331 - 339.
[5] Bellifemine, F.L, Greenwood D and Caire G (2007). Developing Multi-agent systems with JADE. John Wiley & Sons Ltd, England.
[6] Syed A., John D. and Pavana Y. (2000). A survey of mobile agent systems. Student Report, Department of Computer Science and Engineering, University of California San Diego. (Date of last access: 03 July, 2013 from cseweb.ucsd.edu/classes/sp00/cse221/reports/dat-yal-and.pdf).
[7] van "t Noordende, G.J., Overeinder, B.J., Timmer, R.J., Brazier, F.M.T. and Tanenbaum, A.S. (2009). Constructing secure mobile agent systems using the agent operating system‟, International Journal of Intelligent Information and Database Systems, Vol. 3, No. 4, pp.363–381.
[8] Gabriel S. and Claudiu I.P. 2010. A Proposal for an Enhanced Mobile Agent Architecture (EMA). Annals of the University of Craiova, Mathematics and Computer Science Series, 37(1): 71 – 79.
[9] Tudor M., Bogdan D., Mihaela D., Ioan S. 2004. A Framework of Reusable Structures for Mobile agent Development. Proceedings of the 8th IEEE international Conference on Intelligent Engineering Systems (INES '04), Cluj-Napoca, 2004.
[10] Giovanni C. 2009. JADE Programming for Beginners. TILAB, S.P.A.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: Image segmentation is a fundamental and complex task in many image processing applications. In this paper, we propose a hybrid method for color image segmentation by integrating color edge information and seeded region growing. We use the color edge information to decide the best position to place the seed and to control the growth of the region. By using color edge detection technique, regions without edges are labeled as the initial seed. Regions are grown from this seed point by adding neighboring pixels that are similar based on homogeneity criterion. The obtained edge map and the region growth map are fused together to produce homogeneous regions with closed boundaries. Finally region merging is done to merge small regions.
Keywords: Seeded Region Growing, Color Similarity, Edge detection, Region Merging
[1] H. Cheng, X. Jiang, Y. Sun, and J. Wang, "Color image segmentation:Advances & prospects," Pattern Recognition., 34( 12), 2001, 2259–2281.
[2] N. Otsu, A threshold selection method from gray-level histogram, IEEE Transactions on Systems, Man, and Cybernetics ,9(1), 1979, 62–66.
[3] A.K.C. Wong, P.K. Sahoo, A gray-level threshold selection method based on maximum entropy principle, IEEE Transactions on Systems, Man and Cybernetics,19(4), 1989, 641–647.
[4] H.D. Cheng, C.H. Chen, H.H. Chiu, H. Xu, Fuzzy homogeneity approach to multilevel thresholding, IEEE Transactions on Image Processing ,7(7), 1998, 1084–1088.
[5] E. Saber, A. Tekalp, and G. Bozdagi, "Fusion of color and edge information for improved segmentation and edge linking," Imag. Vis.Comput., 15(10),1997, 769–780.
[6] J. Basak, B. Chanda, On edge and line linking with connectionist model, IEEE Transactions on System, Man, and Cybernetics ,24(3), 1994, 413–428.
[7] A. Marteli, An application of heuristic search methods to edge and contour detection, Graphics and Image Processing, 19(2), 1976, 73–83.
[8] V.S. Nalwa, E. Pauchon, Edgel aggregation and edge description, Computer Vision, Graphics, and Image Processing, 40(1), 1987, 79–94.
[9] A. Tremeau, N. Bolel, A region growing and merging algorithm to color segmentation, Pattern Recognition .30(7), 1997, 1191–1203.
[10] Frank Y.Shih, Shouxian Cheng, Automatic Seeded Region Growing for color image Segmentation, Pattern Recognition, 23, 2005, 877-886.
- Citation
- Abstract
- Reference
- Full PDF
| Paper Type | : | Research Paper |
| Title | : | Secure Development - Web Application Security. |
| Country | : | India |
| Authors | : | Sayyad Arif Ulla |
| : | 10.9790/0661-1461422 ![]() |
Abstract: In Current scenario, many Web applications go through rapid development phases like adopting agile methodology of development with very short turnaround time, making it difficult to identify and eliminate vulnerabilities. This paper provides analysis of requirement of Secure Development and Web application security assessment mechanisms in order to identify poor coding practices that render Web applications vulnerable to attacks such as SQL injection and cross-site scripting. This paper also list out the different categories of vulnerability with the small examples along with prevention guidance and a sample of research by different vendors about the State of Software Security Report and Web Application Vulnerability Statistics of 2012.
............................,
