Search or add a thesis

Advanced Search (Beta)
Home > Modelling Interaction Using Trust and Recommendations in Pervasive Computing Environment

Modelling Interaction Using Trust and Recommendations in Pervasive Computing Environment

Thesis Info

Access Option

External Link

Author

Iltaf, Naima

Program

PhD

Institute

National University of Sciences & Technology

City

Islamabad

Province

Islamabad

Country

Pakistan

Thesis Completing Year

2013

Thesis Completion Status

Completed

Subject

Computer Science

Language

English

Link

http://prr.hec.gov.pk/jspui/bitstream/123456789/10107/1/Naima_Altaf_Computer_Software_Engineering_2013_NUST_13.06.2016.pdf

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676727792378

Similar


Pervasive computing is characterized by large numbers of roaming entities and the absence of a globally available fixed infrastructure. In such an environment entities need to collaborate with little known or even unknown entities. In traditional environments with clearly defined administrative boundaries security decisions are usually delegated to a centralized administrative authority. In the pervasive computing environment no single entity can play this role, entities are required to make their own security decisions and as a result traditional techniques are not an option. Human notion of trust enables human societies to collaborate and interact based on personal and shared experiences. Thus a security model based on the real world characteristics of trust can provide the internal security for autonomous computing devices embedded in pervasive environment before taking action, despite uncertainty and inadequate information. The work presents an adaptive trust and recommendation based access control model based on human notion of trust. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. A mathematical formula together with adaptable security policies is introduced to handle malicious strategic attack in direct trust computation. The model encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. The performance of indirect trust computation models (based on recommendations) can be easily compromised due to the subjective and social-based prejudice of the provided recommendations. Eradicating the influence of such recommendation remains an important and challenging issue in indirect trust computation models. An effective model for indirect trust computation is also proposed which is capable of identifying dishonest recommendations. Dishonest recommendations are identified by using deviation based detecting technique. The concept of measuring the credibility of recommeni dation (rather than credibility of recommender) using fuzzy inference engine is also proposed to determine the influence of each honest recommendation. The proposed model has been compared with other existing evolutionary recommendation models in this field, and it is shown that the model is more accurate in measuring the trustworthiness of unknown entity. An XML-over-UDP based recommendation exchange protocol to share recommendation information between smart devices, is also outlined to complement the model. Implementation of the proposed model on android smart phone using OSGi is presented to demonstrate the effectiveness of the protocol in pervasive computing environment. Experimental results demonstrate that using HTTP or TCP for recommendation exchange between smart devices in wireless environment lead to significantly higher overhead as compared to XML-over-UDP. In general, our research work presents a comprehensive framework for secure trust based access control that will augment future research towards real world implementation of pervasive computing environment.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

چوتھادروازہ

چوتھادروازہ

خالدفتح محمد

اُس کی اُداسی،پریشانی،لاتعلقی اور غمی بالکل اُسی طرح تھی جیسے پہلے شوہر کی موت سے چند دِن پہلےتھاجو کچھ ہوجانے کی دلیل تھی یا نایافتنی کا احساس۔ یہ خیال آتے ہی وہ پریشان ہوگئی۔وہ اگر پہلے شوہر سے خوش نہیں تھی تو دوسرے کے ساتھ ایسا قریبی تعلق نہیں تھا کہ اُسے اُس کے مر جانے کا دکھ ہو : دکھ تو کسی بھی موت کا ہوا کرتا ہے۔ یہ آدمی اُس کی مادی زندگی کی ضروریات پوری کرتارہاتھااور اُس میں کوئی ایسی خرابی بھی نہیں تھی لیکن وہ اُس کے ساتھ خود کو جوڑ نہ سکی ۔ وہ ذہنی طور پراُس سے اُتنا ہی دور رہی جتنا پہلے خاوند سے تھی۔پہلے خاوند سے شادی اگر اتفاق نہیں تھاتو اُسے منصوبہ کہنابھی مناسب نہیں،اُسے جو آدمی پسند تھااُس کے ساتھ شادی ممکن نہیں تھی کیوں کہ وہ آدمی اچھی شہرت نہیں رکھتاتھا۔اُسے شراب کی عادت تھی ،ہر وقت نشے میں ہوتااور جب کبھی اُسے دیکھتا،احترام میں نظر نیچے کرکے ایک طرف ہٹ کے کھڑا ہوجاتا۔وہ اُس کے پاس سے گزرجانے تک وہیں کھڑارہتا۔شروع میں اُسے اُس کا ایک طرف ہٹ کے کھڑے ہونا نشے کا حصہ لگالیکن جب یہ ہمیشہ ہی ہونے لگاتواُسے احساس ہواکہ وہ ایسا اُس کے لیے کرتاہے اور وہ اُسے ایسی نظر سے دیکھنے لگی جس سے ارد گرد کے باقی لوگ نہیں دیکھتے تھے:وہ اب پاس سے گزرتے ہوئے ہمیشہ مسکرادیتی۔یہ مسکراہٹ بالکل واضح نہیں تھی،ہونٹوں کی ہلکی سی جنبش،آنکھوں میں ہلکی سی روشنی کا سایہ،گالوں پر ہلکی سی سرخی کا کھنڈ جانااور چال کا ہلکے سے شتابی ہو جانا۔ جب یہ سب ہو رہاہوتااور وہ خود بھی نہیں جانتی تھی کہ ہورہاہے ،وہ آدمی اِِس تبدیلی دیکھ رہاہوتااور اُس کی اُسے دیکھنے کی خوشی اُداسی میں تبدیل ہو...

ظہرین کے اوقات میں اشتراکات: اسلام کے پانچ بڑے فقہی مکاتب فکر کے تناظر میں

In India scholar‘s had played incredible role for ‘Hadith’. The service of Indian Muslim scholars about methodology of Hadith is much more than other countries scholars in the last 50 years of thirteenth century. Their name should be written in golden words. There services about the methodology of Hadith are great one. Muslim scholars of sub-continent had taken keen interest in the research work of Hadith and its explanation. If we evaluate the theological history of India that ; Shah Waiullah ‘and his family worked day and night for expansion and publishing of’ Hadith  ‘ Thirteenth century of hire is called a century of revolution as concerned for Hadith. Because in that era proper theological institutions were set up and very strong institutions had spread knowledge and study of methodology of Hadith

Formulation Development of Mucoadhesive Drug Delivery System for Milnacipran Hcl Using Design of Experiment Approach

Milnacipran HCl is a potential candidate to treat fibromyalgia associated with or without depression like comorbid conditions. The requirements of multiple dosing, absorption in first part of small intestine and fluctuating steady state plasma concentrations of drug have made it a suitable candidate for gastro-retentive sustained release drug delivery system. The utility of chitosan as mucoadhesive and polycaprolactone as hydrophobic polymer was aimed for creation of this matrix delivery system. Modified hot melt granulation with addition of second polymeric solution was opted for preparing optimized blends of acetaminophen. Modified wet granulation technique was utilized to prepare blends of milnacipran with different ratios of polymers. The optimized solutions for formulations containing blends of three polymers and drug with two solvents, i.e., dichloromethane and chloroform was optimized using design of experiment. A simple and sensitive colorimetric method for estimation of milnacipran was developed with ninhydrin to properly estimate drug from dissolution samples at 570 nm wavelength. The optimized blends were characterized for mucoadhesive time and strength using tensiometer, drug release analysis opting HCl buffer pH 1.2 for 12 h, kinetics of drug release and drug excipient compatibility analysis by utilizing FTIR and DSC. The optimized formulations M21-M24 were compared against reference formulation specifications for similarity index (f1 and f2). The optimized formulations were also scaled down containing 30 mg of drug according to weight of animals and were characterized for release parameters, i.e., the time to release certain percentage of drug (T10%-T90%). Different pharmacokinetic parameters were evaluated for M44 formulation using both non-compartment and two compartment model approaches. The best correlation (R2) values of 1 were observed with non-compartment model so parameters calculated were used to establish in-vitro in-vivo II correlation after estimating fractions of milnacipran absorbed/unabsorbed and time to absorb specific concentration of milnacipran using Wagner-Nelson method. The developed analytical method proved sensitive and precise with LOD and LOQ values of 0.55 and 1.667 μg/ml, respectively. Mucoadhesive strength was found as 201.06±16.8 dynes for different formulations with more than 12 h of adhesion time. Drug release studies showed release independent of concentration and was best described by Korsmeyer-Peppas model representing swelling controlled system. The n values of 0.5-0.7 showed dependency of release on both dissolution and diffusion mechanism. There were only physical interactions observed at various positions of IR spectrum with functional groups of polymers and drug were found intact. Thermal studies revealed that milnacipran has sharp melting point of 179.85℃ which was lowered to round about 154.30℃ due to covalent and ionic interactions required to form true blend with polymers. M24 formulation proved best on similarity parameters, i.e., f1=6.09, and f2=72.46, representing true similarity. Cmax, Tmax, and AUC0-∞ calculated for M54 were markedly found different from oral solution (P˂0.05) proving sustained delivery of milnacipran from the formulation blends. Bioavailability of M54 formulation was three fold improved as compared to solution. Level A correlation was established by comparing the above parameters and found R2 were 0.992, 0.9831 and 0.9998. The above results proved that milnacipran might be formulated as mucoadhesive DDS using three polymers opting design of experiment approach and evidenced best on IVIVC. III