2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

筛选
英文 中文
Bit level symmetric key cryptography using genetic algorithm 使用遗传算法的位级对称密钥加密
A. Sen, Attri Ghosh, A. Nath
{"title":"Bit level symmetric key cryptography using genetic algorithm","authors":"A. Sen, Attri Ghosh, A. Nath","doi":"10.1109/CSNT.2017.8418536","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418536","url":null,"abstract":"Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R 基于矢量信号收发器5644R的QAM和QPSK无线局域网链路性能研究
G. Soni, C. Verma
{"title":"Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R","authors":"G. Soni, C. Verma","doi":"10.1109/CSNT.2017.8418507","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418507","url":null,"abstract":"A wireless local area network (WLAN) is a digital transmission system designed to provide location independent network access between computing devices by using radio waves in a limited area. Mainly IEEE 802.11 standards are used to provide wireless connectivity at higher speeds. To analyze and check the continuous feasibility of WLAN signal, Vector Signal Transceiver-VST 5644R can be the efficient approach. In this paper the experimental investigation and analysis of WLAN 802.11 standard has been carried out based on vector signal transceiver VST 5644R using different modulation schemes. It was analyzed that QPSK gives best link performance for the WLAN link. The results are being analyzed in terms of EVM (Error vector magnitude). The link has been evaluated at 2.4GHz using QPSK and QAM modulation schemes. This work is based on experimental and real time implementation of WLAN Link based on PXIe 1062Q VST 5644 platform.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inventory supply & shelfing through data analytics 通过数据分析库存供应和货架
Komal Verma, R. Pandey, Nidhi Srivastava
{"title":"Inventory supply & shelfing through data analytics","authors":"Komal Verma, R. Pandey, Nidhi Srivastava","doi":"10.1109/csnt.2017.8418566","DOIUrl":"https://doi.org/10.1109/csnt.2017.8418566","url":null,"abstract":"Experts from different specialized fields trust that another era of Computer Science is emerging. Sometime ago, applications use to run on the individual PC framework's hard drive. With taking a break, the application started to be put away on a nearby server of an organization and from that point the applications were keep running on the individual framework. The following stage to this advancement of software engineering time is moving both the applications and information to the ‘Cloud’, where all information is put away at a virtual server and can be gotten to from anyplace through Internet. Microsoft Azure is a Microsoft's open Cloud Computing Platform. It gives an extensive variety of cloud administrations from Data Storage, Analysis to Computing and Networking of Data. Analysis through Machine learning is one of the administrations that Azure Offers. For dissecting one can use programming languages like R, Python and Visual Studio. R gives a Programming domain broadly utilized for graphically analysis and measurable computing.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信