电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.1110009
Mohan Nagamunthala, Ramakrishnan Manjula
{"title":"Implementation of a Hybrid Triple-Data Encryption Standard and Blowfish Algorithms for Enhancing Image Security in Cloud Environment","authors":"Mohan Nagamunthala, Ramakrishnan Manjula","doi":"10.4236/jcc.2023.1110009","DOIUrl":"https://doi.org/10.4236/jcc.2023.1110009","url":null,"abstract":"In recent years, technological advancements have provided the world with cloud computing which can transfer, store, and process huge data chunks in the form of video, audio, images, and text efficiently. In spite of the universal hype on the subject across the information technology world, protecting sensitive data stored in the cloud server is one of the crucial problems. The large volume and sophistication of cyberattacks conclude to the fact that private pictures need exceptional care than other forms of data on the cloud. Since the user who has stored their private pictures in the cloud has no control over the privacy protection of data, the cloud vendors have to assure a greater level of security in terms of authentication and prevention from cyberattacks. Image encryption algorithms secure visual data by transmuting pictures into an unintelligible form to preserve the confidentiality of pictures over reliable unrestricted social media. This work aims to develop a method for enhancing the security of user photographs on a cloud platform by means of cryptography algorithms. The proposed hybrid technique presents the idea of protecting images in two straightforward steps. First, we generate a chipper text (i.e., secret key) using Triple Data Encryption Standard (TDES) by giving a plaintext and a key as input. Then, the cipher text obtained from TDES is given to the Blowfish algorithm for encrypting the user images. The encrypted image is then uploaded to the database of the cloud server and can be retrieved whenever the user requests it. Both image encryption and decryption processes are analyzed and evaluated based on performance metrics such as cloud storage time, encryption time, decryption time, and encryption throughput. A comparative study with conventional image encryption methods will demonstrate the effectiveness and robustness of our proposed method.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135319074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.112001
G. B. N’guessan, Ida Brou Assie, Jean S. Inkpé Haudie
{"title":"Improving Resilience Models of Health Systems before COVID-19 Pandemic in Côte d’Ivoire","authors":"G. B. N’guessan, Ida Brou Assie, Jean S. Inkpé Haudie","doi":"10.4236/jcc.2023.112001","DOIUrl":"https://doi.org/10.4236/jcc.2023.112001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70935097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.115011
Rukaiya Habib, M. Ferdous, M. Anwar
{"title":"Creating Bengali Freebase Using Wikidata","authors":"Rukaiya Habib, M. Ferdous, M. Anwar","doi":"10.4236/jcc.2023.115011","DOIUrl":"https://doi.org/10.4236/jcc.2023.115011","url":null,"abstract":"Freebase is a large collaborative knowledge base and database of general, structured information for public use. Its structured data had been harvested from many sources, including individual, user-submitted wiki contributions. Its aim is to create a global resource so that people (and machines) can access common information more effectively which is mostly available in English. In this research work, we have tried to build the technique of creating the Free-base for Bengali language. Today the number of Bengali articles on the internet is growing day by day. So it has become a necessary to have a structured data store in Bengali. It consists of different types of concepts (topics) and relationships between those topics. These include different types of areas like popular culture (e.g. films, music, books, sports, television), location information (restaurants, geolocations, businesses), scholarly information (linguistics, biology, astronomy), birth place of (poets, politicians, actor, actress) and general knowledge (Wikipedia). It will be much more helpful for relation extraction or any kind of Natural Language Processing (NLP) works on Ben-gali language. In this work, we identified the technique of creating the Bengali Freebase and made a collection of Bengali data. We applied SPARQL query language to extract information from natural language (Bengali) documents such as Wikidata which is typically in RDF (Resource Description Format) triple format.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.115008
Faxu He, Liye Zhang
{"title":"Design of Indoor Security Robot based on Robot Operating System","authors":"Faxu He, Liye Zhang","doi":"10.4236/jcc.2023.115008","DOIUrl":"https://doi.org/10.4236/jcc.2023.115008","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.115012
Wenhao Zhao, Shengbo Hu
{"title":"End-to-End Auto-Encoder System for Deep Residual Shrinkage Network for AWGN Channels","authors":"Wenhao Zhao, Shengbo Hu","doi":"10.4236/jcc.2023.115012","DOIUrl":"https://doi.org/10.4236/jcc.2023.115012","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70936971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2023-01-01DOI: 10.4236/jcc.2023.118001
J. Essien, Martin Ogharandukun
{"title":"Neural Network-Based Performance Index Model for Enterprise Goals Simulation and Forecasting","authors":"J. Essien, Martin Ogharandukun","doi":"10.4236/jcc.2023.118001","DOIUrl":"https://doi.org/10.4236/jcc.2023.118001","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"695 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70939086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2022-01-29DOI: 10.36227/techrxiv.18866159
Yuwei Chen, Jia-Zhou He
{"title":"Deep learning-based emotion detection","authors":"Yuwei Chen, Jia-Zhou He","doi":"10.36227/techrxiv.18866159","DOIUrl":"https://doi.org/10.36227/techrxiv.18866159","url":null,"abstract":"Since the deep learning methods used in current face recognition do not balance well between recognition rate and recognition speed, the present work proposed a face expression recognition model based on multilayer feature fusion with lightweight convolutional networks. The model is tested on two commonly used real expression datasets, FER- 2013 and AffectNet, the accuracy of ms_model_M is 74.35% and 56.67%, respectively, and the accuracy of the traditional MovbliNet model is 74.11% and 56.48% in the tests of these two datasets.","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43902539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2022-01-01DOI: 10.4236/jcc.2022.1010005
Yang G. Kim, Benito Mendoza, Ohbong Kwon, John Yoon
{"title":"Task-Specific Feature Selection and Detection Algorithms for IoT-Based Networks","authors":"Yang G. Kim, Benito Mendoza, Ohbong Kwon, John Yoon","doi":"10.4236/jcc.2022.1010005","DOIUrl":"https://doi.org/10.4236/jcc.2022.1010005","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70930522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
电脑和通信(英文)Pub Date : 2022-01-01DOI: 10.4236/jcc.2022.1010010
Ahood Alotaibi, Lama Alhubaidi, Alghala Alyami, Leena A. Marghalani, Bashayer Alharbi, Naya Nagy
{"title":"Preventing Phishing Attack on Voting System Using Visual Cryptography","authors":"Ahood Alotaibi, Lama Alhubaidi, Alghala Alyami, Leena A. Marghalani, Bashayer Alharbi, Naya Nagy","doi":"10.4236/jcc.2022.1010010","DOIUrl":"https://doi.org/10.4236/jcc.2022.1010010","url":null,"abstract":"","PeriodicalId":67799,"journal":{"name":"电脑和通信(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70930526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}