- Genome Rearrangement Algorithms
- Cryptographic Implementations and Security
- Algorithms and Data Compression
- Caching and Content Delivery
- Chromosomal and Genetic Variations
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Opportunistic and Delay-Tolerant Networks
- DNA and Biological Computing
- Green IT and Sustainability
- Enzyme Production and Characterization
- IoT and Edge/Fog Computing
- Smart Grid Security and Resilience
- Network Security and Intrusion Detection
- Optimization and Search Problems
- Security and Verification in Computing
- Chaos-based Image/Signal Encryption
- Information and Cyber Security
- Cooperative Communication and Network Coding
- Advanced Malware Detection Techniques
- Smart Agriculture and AI
- Cloud Computing and Resource Management
- Water Quality Monitoring Technologies
University of North Florida
2015-2024
IBM (United States)
2006-2013
University at Buffalo, State University of New York
2011-2013
New York University
2011
IBM (India)
2008
Energy consumption has emerged as a first class computing resource for both server systems and personal devices. The growing importance of energy led to rethink in hardware design, hypervisors, operating compilers. Algorithm design is still relatively untouched by the algorithmic complexity models do not capture consumed an algorithm. In this paper, we propose new model account used Based on abstract memory (which was inspired popular DDR3 similar parallel disk I/O Vitter Shriver), present...
Precision agriculture is the collection of hardware and software technologies that allow a farmer to make informed, differentiated decisions regarding agricultural operations such as planting, fertilizing, pest control, harvesting. In recent years, advances in machinery emergence robots continuously increased resolution at which treatment possible. This creates corresponding need for information fine spatial temporal resolution. Autonomous multi-robot systems (e.g., unmanned ground aerial...
Some enzymes can catalyze more than one chemical conversion for which they are physiologically specialized. This secondary function, is called underground, promiscuous, metabolism, or cross activity, recognized as a valuable feature and has received much attention developing new catalytic functions in industrial applications. In this study, novel bifunctional xylanase/β-glucosidase metagenomic-derived enzyme, PersiBGLXyn1, with underground β-glucosidase activity was mined by in-silico...
Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while significantly mitigating cybersecurity risks. Tradeoffs between availability security arise at implementation, however, triggered by the additional resources (e.g., memory computation) required blockchain-enabled hosts. This paper applies an energy-reducing algorithmic engineering technique for Merkle Tree (MT) root calculations Proof of Work (PoW)...
Elliptic curve cryptography (ECC) is extensively used in various multifactor authentication protocols. In this work, recent ECC-based and key exchange protocols are subjected to threat modeling static analysis detect vulnerabilities enhance them be more secure against threats. This work demonstrates how currently-used vulnerable attacks. If vulnerable, damage could include critical data loss elevated privacy concerns. The considered differ their usage of security factors (e.g., passwords,...
α-Amylases are among the very critical enzymes used for different industrial purposes. Most α-amylases cannot accomplish requirement of conditions and easily lose their activity in harsh environments. In this study, a novel α-amylase named PersiAmy1 has been identified through multistage silico screening pipeline from rumen metagenomic data. The long-term storage low high temperatures demonstrated 82.13 71.01% activities after 36 days incubation at 4 50°C, respectively. stable retained...
Blockchain-powered smart systems deployed in different industrial applications promise operational efficiencies and improved yields, while mitigating significant cybersecurity risks pertaining to the main application. Associated tradeoffs between availability security arise at implementation, however, triggered by additional resources (e.g., memory, computation) required each blockchain-enabled host. This paper applies an energy-reducing algorithmic engineering technique for Merkle Tree root...
Hash-based message authentication code (HMAC) involves a secret cryptographic key and an underlying crypto-graphic hash function. HMAC is used to simultaneously verify both integrity authenticity of messages and, in turn, plays significant role secure communication protocols e.g., Transport Layer Security (TLS). The high energy consumption well-known as the trade-off between security, consumption, performance. Previous research reducing has approached problem primarily at system software...
In this work, we argue that energy management should be a guiding principle for design and implementation of algorithms. Traditional complexity models algorithms are simple do not aid in energy-efficient conducted large number experiments to understand consumption We study the popular vector operations, matrix sorting, graph observed any given algorithm depends on memory parallelism can exhibit data layout RAM with variations up 100% many Our validate asymptotic model presented companion...
In the services domain, customers raise issues and service requests in form of tickets. There is a pool personnel who work on these tickets resolve them. The problem at hand to dispatch most appropriate personnel. Optimality applied metrics like mean time taken ticket, fair sharing workload among personnel, size configuration pool. current state art involves human dispatcher for assigning incoming requests. Though intelligent, can be suboptimal with respect above mentioned objectives due...
Protecting and securing data that reside at various hosts in the Internet has become more important than ever before because of growing number cyber attacks. Though there have been several studies related to denial service cache attacks, those are primarily based on simulations investigations attacks real networks still lacking.
In this work we consider two elliptic curve cryptography based authentication protocols for performing cryptanalysis and security enhancement. The first one by Moosavi et al., is a mutual scheme RFID implant systems. We perform on protocol observe that it prone to the clogging attack, kind of denial service (DoS) attack. then suggest an improvement prevent other analysis Xu al. This smart card protocol. again attack via replay. all which precede require server compute computationally...
In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart cards. We note that has already been shown vulnerable to the off-line guessing attack Tapiador et al. perform further protocol observe it prone clogging attack, kind of denial service (DOS) attack. all card which precede require server compute computationally intensive modular exponentiation, like Xu al., or Lee are Further,...
With the exponential growth of content, Internet is undergoing a transformation from host-centric approach to content-centric one, popularly known as an Information Centric Networks (ICN). ICN aims improve user performance by incorporating in-network caching at storage enabled nodes. In this paper, we explore scalability and effectiveness targeted denial service attack (DoS) designed for [1]. attack, malicious nodes periodically request unpopular thereby replacing popular content in caches...
We study the problem of information sampling an ambient phenomenon using a group mobile robots. Autonomous robots are being deployed for various applications such as precision agriculture, search-and-rescue, among others. These usually equipped with sensors and tasked collecting maximal further data processing decision making. The studied is proved to be NP-Hard in literature. To solve stated approximately, we employ multi-agent deep reinforcement learning framework use concepts mean field...
In this work, we perform security analysis of using an e-mail as a self-service password reset point, and exploit some the vulnerabilities servers' forgotten paths. We illustrate three different attacks on personal Email account, variety tools such as: public knowledge attainable through social media or records to answer questions execute engineering attack, hardware available man in middle free software brute-force attack login email account. Our results expose inherent emails points. The...
In a coordinated multi-robot information sampling scenario, robots often share their collected with others for better prediction. As any other online data sharing technique, integrity is concern, but it has not yet been addressed in the literature. this paper, we study how to secure being shared among such network against attacks and what cost of integrating security techniques. To end, propose Blockchain-based protocol that helps reject fake injection by malicious entity. On hand, optimal...
In this work we compute the energy generated by modular exponentiation, a widely used powerful tool in password authentication protocols for cyber physical systems. We observe exponentiation to be an expensive operation terms of consumption addition known computationally intensive. then analyze security and advanced smart card based protocol systems, that use exponentiation. devise generic cryptanalysis method on protocol, which attacker exploits computational intensive nature perform denial...
In this paper, we study a genome rearrangement primitive called block moves. This as special case of another well studied transposition. We revisit the problem BLOCK SORTING, which is sorting under moves in work. SORTING has been shown to be NP-Complete, and couple results have designed factor 2 approximation algorithms for - best known till date. However whether APX-Hard, or an improvement over interesting open problems. design new algorithm SORTING. Our equal terms ratio, however, our...