Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran
{"title":"Secure Payment Solutions Fully Off-Line Functions on Frodo","authors":"Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran","doi":"10.9790/0661-1902057679","DOIUrl":"https://doi.org/10.9790/0661-1902057679","url":null,"abstract":"Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73283369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Non Conventional Energy Based Mobile Charger towards Green Computing","authors":"K. Kumar, S. Saha, Aniket Kumar, S. Sahana","doi":"10.9790/0661-1902055865","DOIUrl":"https://doi.org/10.9790/0661-1902055865","url":null,"abstract":"Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83399076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System","authors":"H. Al-Khafaji, A. Habeeb","doi":"10.9790/0661-1903024450","DOIUrl":"https://doi.org/10.9790/0661-1903024450","url":null,"abstract":"The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85359286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption","authors":"P. Subashini, Jaspal Singh, Adipta Biswas","doi":"10.9790/0661-1903010105","DOIUrl":"https://doi.org/10.9790/0661-1903010105","url":null,"abstract":"In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Mechanical fixture for thread detection","authors":"Fu Bengang, C. Weiming, Shang Wei","doi":"10.9790/3021-0705015053","DOIUrl":"https://doi.org/10.9790/3021-0705015053","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90077908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Experimental speech recognition system based on Raspberry Pi 3","authors":"Hasan Gyulyustan, Svetoslav Enkov","doi":"10.9790/0661-190302107112","DOIUrl":"https://doi.org/10.9790/0661-190302107112","url":null,"abstract":"The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli
{"title":"The New Approach of AES Key Schedule for Lightweight Block Ciphers","authors":"M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli","doi":"10.9790/0661-1903042126","DOIUrl":"https://doi.org/10.9790/0661-1903042126","url":null,"abstract":"This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75622100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing","authors":"D. Kumar, Jitendra Sheetalani","doi":"10.9790/0661-1903013849","DOIUrl":"https://doi.org/10.9790/0661-1903013849","url":null,"abstract":"Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80398863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar
{"title":"Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels","authors":"Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar","doi":"10.9790/0661-1903013437","DOIUrl":"https://doi.org/10.9790/0661-1903013437","url":null,"abstract":"The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90959371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Backward Approach Development for Route Adaptive Mobile Successive Recommendation","authors":"Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley","doi":"10.9790/0661-1903032932","DOIUrl":"https://doi.org/10.9790/0661-1903032932","url":null,"abstract":"The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88765357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}