{"title":"Detection of Forgery and Fabrication in Passports and Visas using Cryptography and QR Codes","authors":"Cheman Shaik","doi":"10.5121/ACIJ.2021.12101","DOIUrl":"https://doi.org/10.5121/ACIJ.2021.12101","url":null,"abstract":"In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exploring the Link Between Leadership and Devops Practice and Principle Adoption","authors":"Krikor Maroukian, S. Gulliver","doi":"10.5121/acij.2020.11401","DOIUrl":"https://doi.org/10.5121/acij.2020.11401","url":null,"abstract":"Our research focuses in software-intensive organizations and highlights the challenges that surface as a result of the transitioning process of highly-structured to DevOps practices and principles adoption. The approach collected data via a series of thirty (30) interviews, with practitioners from the EMEA region (Czech Republic, Estonia, Italy, Georgia, Greece, The Netherlands, Saudi Arabia, South Africa, UAE, UK), working in nine (9) different industry domains and ten (10) different countries. A set of agile, lean and DevOps practices and principles were identified, which organizations select as part of DevOps-oriented adoption. The most frequently adopted ITIL® service management practices, contributing to DevOps practice and principle adoption success, indicate that DevOps-oriented organizations benefit from the existence of change management, release and deployment management, service level management, incident management and service catalog management. We also uncover that the DevOps adoption leadership role is required in a DevOps team setting and that it should, initially, be an individual role.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Infrastructure and Security Automation","authors":"A. Mathew","doi":"10.5121/acij.2019.10601","DOIUrl":"https://doi.org/10.5121/acij.2019.10601","url":null,"abstract":"AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result shows that compared with the signature-based system, AI-supported security applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and correlating large volumes of data to facilitate the detection and response to threats.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"61 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"E-Commerce Credibility in Saudi Arabia : Consumer Perspective","authors":"Shahad Khoja","doi":"10.5121/acij.2018.9501","DOIUrl":"https://doi.org/10.5121/acij.2018.9501","url":null,"abstract":"The purpose of this paper is to investigate the e-commerce credibility factors affecting the perception of users in Saudi Arabia and, moreover, to investigate whether the variation of credibility factors in Saudi Arabian e-commerce websites influence users' performance. Website credibility, which refers to the believability of the website and its content, plays an important role in consumers’ successful online shopping experience and satisfaction. This investigation is conducted by employing two credibility evaluation methods: heuristic evaluation and performance measurement. This study adopts Fogg's 10 Stanford credibility guidelines as a starting point for the heuristic evaluation. In the performance measurement method, two measurements are used: the amount of time needed to finish the task and the total number of clicks taken to finish the task. A frequency analysis of the comments and a one-way ANOVA test are used to establish the results. Three e-commerce websites in Saudi Arabia are selected. The findings show that Fogg’s 10 Stanford credibility guidelines can be implemented in the Saudi Arabian e-commerce context with minor modifications and expansions by adding reputation, endorsement, security, and service diversity guidelines. Another important finding is that professional website design plays a vital role in users' first impression of websites, while usability is the most important credibility factor investigated used to evaluate the credulity of an e-commerce website. Lastly, the results of this study indicate a relationship between the e-commerce credibility level and users’ performance. This paper contributes to the literature by providing a set of credibility guidelines associated with specific criteria, which can be assessed to improve the future of e-commerce in Saudi Arabia.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secured AODV Routing Protocol for the Detection and Prevention of Black Hole Attack in VANET","authors":"Salim Lachdhaf, Mohammed Mazouzi, M. Abid","doi":"10.5121/ACIJ.2018.9101","DOIUrl":"https://doi.org/10.5121/ACIJ.2018.9101","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving Privacy and Security in Multi-Tenant Cloud ERP Systems","authors":"Djamal Ziani, R. Al-Muwayshir","doi":"10.5121/ACIJ.2017.8501","DOIUrl":"https://doi.org/10.5121/ACIJ.2017.8501","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluating the Internal and External Usability Attributes of E-Learning Websites in Saudi Arabia","authors":"Khalid Al-Omar","doi":"10.5121/ACIJ.2017.8401","DOIUrl":"https://doi.org/10.5121/ACIJ.2017.8401","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bhawana S. Dakhare, Mrunal M. Ruke, S. Gore, Supriya Chavan
{"title":"Maintaining Data Integrity for Shared Data in Cloud","authors":"Bhawana S. Dakhare, Mrunal M. Ruke, S. Gore, Supriya Chavan","doi":"10.9790/9622-0704010103","DOIUrl":"https://doi.org/10.9790/9622-0704010103","url":null,"abstract":"Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle the applications. User can easily modify the shared and stored data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When user misbehaves or misuses the system the admin has authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the cloud.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Colour Image Represention of Multispectral Image Fusion","authors":"Preema Mole, M. Mathurakani","doi":"10.5121/ACIJ.2016.7302","DOIUrl":"https://doi.org/10.5121/ACIJ.2016.7302","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Sebastian, Richa Kuriakose, Surekha Mariam Varghese
{"title":"NEO4J, SQLITE and MYSQL for Hospital Localization","authors":"A. Sebastian, Richa Kuriakose, Surekha Mariam Varghese","doi":"10.5121/ACIJ.2016.7303","DOIUrl":"https://doi.org/10.5121/ACIJ.2016.7303","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}