Advanced Computing: An International Journal最新文献

筛选
英文 中文
Detection of Forgery and Fabrication in Passports and Visas using Cryptography and QR Codes 利用密码和QR码侦查护照和签证的伪造和伪造
Advanced Computing: An International Journal Pub Date : 2021-01-31 DOI: 10.5121/ACIJ.2021.12101
Cheman Shaik
{"title":"Detection of Forgery and Fabrication in Passports and Visas using Cryptography and QR Codes","authors":"Cheman Shaik","doi":"10.5121/ACIJ.2021.12101","DOIUrl":"https://doi.org/10.5121/ACIJ.2021.12101","url":null,"abstract":"In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app and place it for download on their website or Google Play Store and iPhone App Store. Any individual or immigration uthority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code using the public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication. Discussed the need for a universal desktop and mobile app that can be used by immigration authorities and consulates all over the world to enable fast checking of passports and visas at ports of entry for forgery and fabrication","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126757704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Link Between Leadership and Devops Practice and Principle Adoption 探索领导力与开发运维实践和原则采纳之间的联系
Advanced Computing: An International Journal Pub Date : 2020-07-31 DOI: 10.5121/acij.2020.11401
Krikor Maroukian, S. Gulliver
{"title":"Exploring the Link Between Leadership and Devops Practice and Principle Adoption","authors":"Krikor Maroukian, S. Gulliver","doi":"10.5121/acij.2020.11401","DOIUrl":"https://doi.org/10.5121/acij.2020.11401","url":null,"abstract":"Our research focuses in software-intensive organizations and highlights the challenges that surface as a result of the transitioning process of highly-structured to DevOps practices and principles adoption. The approach collected data via a series of thirty (30) interviews, with practitioners from the EMEA region (Czech Republic, Estonia, Italy, Georgia, Greece, The Netherlands, Saudi Arabia, South Africa, UAE, UK), working in nine (9) different industry domains and ten (10) different countries. A set of agile, lean and DevOps practices and principles were identified, which organizations select as part of DevOps-oriented adoption. The most frequently adopted ITIL® service management practices, contributing to DevOps practice and principle adoption success, indicate that DevOps-oriented organizations benefit from the existence of change management, release and deployment management, service level management, incident management and service catalog management. We also uncover that the DevOps adoption leadership role is required in a DevOps team setting and that it should, initially, be an individual role.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122454433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cybersecurity Infrastructure and Security Automation 网络安全基础设施和安全自动化
Advanced Computing: An International Journal Pub Date : 2019-11-30 DOI: 10.5121/acij.2019.10601
A. Mathew
{"title":"Cybersecurity Infrastructure and Security Automation","authors":"A. Mathew","doi":"10.5121/acij.2019.10601","DOIUrl":"https://doi.org/10.5121/acij.2019.10601","url":null,"abstract":"AI-based security systems utilize big data and powerful machine learning algorithms to automate the security management task. The case study methodology is used to examine the effectiveness of AI-enabled security solutions. The result shows that compared with the signature-based system, AI-supported security applications are efficient, accurate, and reliable. This is because the systems are capable of reviewing and correlating large volumes of data to facilitate the detection and response to threats.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"61 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-11-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
E-Commerce Credibility in Saudi Arabia : Consumer Perspective 沙特阿拉伯的电子商务信誉:消费者视角
Advanced Computing: An International Journal Pub Date : 2018-09-30 DOI: 10.5121/acij.2018.9501
Shahad Khoja
{"title":"E-Commerce Credibility in Saudi Arabia : Consumer Perspective","authors":"Shahad Khoja","doi":"10.5121/acij.2018.9501","DOIUrl":"https://doi.org/10.5121/acij.2018.9501","url":null,"abstract":"The purpose of this paper is to investigate the e-commerce credibility factors affecting the perception of users in Saudi Arabia and, moreover, to investigate whether the variation of credibility factors in Saudi Arabian e-commerce websites influence users' performance. Website credibility, which refers to the believability of the website and its content, plays an important role in consumers’ successful online shopping experience and satisfaction. This investigation is conducted by employing two credibility evaluation methods: heuristic evaluation and performance measurement. This study adopts Fogg's 10 Stanford credibility guidelines as a starting point for the heuristic evaluation. In the performance measurement method, two measurements are used: the amount of time needed to finish the task and the total number of clicks taken to finish the task. A frequency analysis of the comments and a one-way ANOVA test are used to establish the results. Three e-commerce websites in Saudi Arabia are selected. The findings show that Fogg’s 10 Stanford credibility guidelines can be implemented in the Saudi Arabian e-commerce context with minor modifications and expansions by adding reputation, endorsement, security, and service diversity guidelines. Another important finding is that professional website design plays a vital role in users' first impression of websites, while usability is the most important credibility factor investigated used to evaluate the credulity of an e-commerce website. Lastly, the results of this study indicate a relationship between the e-commerce credibility level and users’ performance. This paper contributes to the literature by providing a set of credibility guidelines associated with specific criteria, which can be assessed to improve the future of e-commerce in Saudi Arabia.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122228721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secured AODV Routing Protocol for the Detection and Prevention of Black Hole Attack in VANET 用于VANET黑洞攻击检测和预防的安全AODV路由协议
Advanced Computing: An International Journal Pub Date : 2018-01-30 DOI: 10.5121/ACIJ.2018.9101
Salim Lachdhaf, Mohammed Mazouzi, M. Abid
{"title":"Secured AODV Routing Protocol for the Detection and Prevention of Black Hole Attack in VANET","authors":"Salim Lachdhaf, Mohammed Mazouzi, M. Abid","doi":"10.5121/ACIJ.2018.9101","DOIUrl":"https://doi.org/10.5121/ACIJ.2018.9101","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132040153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Improving Privacy and Security in Multi-Tenant Cloud ERP Systems 提高多租户云ERP系统的隐私和安全性
Advanced Computing: An International Journal Pub Date : 2017-09-30 DOI: 10.5121/ACIJ.2017.8501
Djamal Ziani, R. Al-Muwayshir
{"title":"Improving Privacy and Security in Multi-Tenant Cloud ERP Systems","authors":"Djamal Ziani, R. Al-Muwayshir","doi":"10.5121/ACIJ.2017.8501","DOIUrl":"https://doi.org/10.5121/ACIJ.2017.8501","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"144 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluating the Internal and External Usability Attributes of E-Learning Websites in Saudi Arabia 评估沙特阿拉伯电子学习网站的内部和外部可用性属性
Advanced Computing: An International Journal Pub Date : 2017-07-30 DOI: 10.5121/ACIJ.2017.8401
Khalid Al-Omar
{"title":"Evaluating the Internal and External Usability Attributes of E-Learning Websites in Saudi Arabia","authors":"Khalid Al-Omar","doi":"10.5121/ACIJ.2017.8401","DOIUrl":"https://doi.org/10.5121/ACIJ.2017.8401","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"262 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Maintaining Data Integrity for Shared Data in Cloud 维护云中共享数据的数据完整性
Advanced Computing: An International Journal Pub Date : 2017-03-31 DOI: 10.9790/9622-0704010103
Bhawana S. Dakhare, Mrunal M. Ruke, S. Gore, Supriya Chavan
{"title":"Maintaining Data Integrity for Shared Data in Cloud","authors":"Bhawana S. Dakhare, Mrunal M. Ruke, S. Gore, Supriya Chavan","doi":"10.9790/9622-0704010103","DOIUrl":"https://doi.org/10.9790/9622-0704010103","url":null,"abstract":"Cloud computing is defined as a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle the applications. User can easily modify the shared and stored data in the cloud. To overcome this data modification in cloud the signature is provided to each individual user who accesses the data in cloud. Once the data is modified by the user on a block, the user must ensure that the signature is provided on that specific block. When user misbehaves or misuses the system the admin has authority to revoke that particular user from the group. After revoking that user, the existing user must re-sign the data signed by the revoked user. In addition to this, the security of the data is also enhanced with the help of public Auditor who is always able to audit the integrity of shared data without retrieving the entire data from the cloud.","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114561345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Colour Image Represention of Multispectral Image Fusion 多光谱图像融合的彩色图像表示
Advanced Computing: An International Journal Pub Date : 2016-05-30 DOI: 10.5121/ACIJ.2016.7302
Preema Mole, M. Mathurakani
{"title":"Colour Image Represention of Multispectral Image Fusion","authors":"Preema Mole, M. Mathurakani","doi":"10.5121/ACIJ.2016.7302","DOIUrl":"https://doi.org/10.5121/ACIJ.2016.7302","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121865684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
NEO4J, SQLITE and MYSQL for Hospital Localization NEO4J, SQLITE和MYSQL用于医院本地化
Advanced Computing: An International Journal Pub Date : 2016-05-30 DOI: 10.5121/ACIJ.2016.7303
A. Sebastian, Richa Kuriakose, Surekha Mariam Varghese
{"title":"NEO4J, SQLITE and MYSQL for Hospital Localization","authors":"A. Sebastian, Richa Kuriakose, Surekha Mariam Varghese","doi":"10.5121/ACIJ.2016.7303","DOIUrl":"https://doi.org/10.5121/ACIJ.2016.7303","url":null,"abstract":"","PeriodicalId":294093,"journal":{"name":"Advanced Computing: An International Journal","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124287868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信