IOSR journal of computer engineering最新文献

筛选
英文 中文
Secure Payment Solutions Fully Off-Line Functions on Frodo 安全支付解决方案完全离线功能的弗罗多
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1902057679
Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran
{"title":"Secure Payment Solutions Fully Off-Line Functions on Frodo","authors":"Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran","doi":"10.9790/0661-1902057679","DOIUrl":"https://doi.org/10.9790/0661-1902057679","url":null,"abstract":"Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73283369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Non Conventional Energy Based Mobile Charger towards Green Computing 一种面向绿色计算的非传统能量移动充电器
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1902055865
K. Kumar, S. Saha, Aniket Kumar, S. Sahana
{"title":"A Non Conventional Energy Based Mobile Charger towards Green Computing","authors":"K. Kumar, S. Saha, Aniket Kumar, S. Sahana","doi":"10.9790/0661-1902055865","DOIUrl":"https://doi.org/10.9790/0661-1902055865","url":null,"abstract":"Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83399076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System 情感分析系统中Tweets预处理和词干提取的高效算法
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903024450
H. Al-Khafaji, A. Habeeb
{"title":"Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System","authors":"H. Al-Khafaji, A. Habeeb","doi":"10.9790/0661-1903024450","DOIUrl":"https://doi.org/10.9790/0661-1903024450","url":null,"abstract":"The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85359286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption 使用预留房间方法和魔术矩形加密的可逆数据隐藏
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903010105
P. Subashini, Jaspal Singh, Adipta Biswas
{"title":"Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption","authors":"P. Subashini, Jaspal Singh, Adipta Biswas","doi":"10.9790/0661-1903010105","DOIUrl":"https://doi.org/10.9790/0661-1903010105","url":null,"abstract":"In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Mechanical fixture for thread detection 螺纹检测机械夹具的设计
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/3021-0705015053
Fu Bengang, C. Weiming, Shang Wei
{"title":"Design of Mechanical fixture for thread detection","authors":"Fu Bengang, C. Weiming, Shang Wei","doi":"10.9790/3021-0705015053","DOIUrl":"https://doi.org/10.9790/3021-0705015053","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90077908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental speech recognition system based on Raspberry Pi 3 基于树莓派3的实验性语音识别系统
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-190302107112
Hasan Gyulyustan, Svetoslav Enkov
{"title":"Experimental speech recognition system based on Raspberry Pi 3","authors":"Hasan Gyulyustan, Svetoslav Enkov","doi":"10.9790/0661-190302107112","DOIUrl":"https://doi.org/10.9790/0661-190302107112","url":null,"abstract":"The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The New Approach of AES Key Schedule for Lightweight Block Ciphers 轻量级分组密码AES密钥调度的新方法
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903042126
M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli
{"title":"The New Approach of AES Key Schedule for Lightweight Block Ciphers","authors":"M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli","doi":"10.9790/0661-1903042126","DOIUrl":"https://doi.org/10.9790/0661-1903042126","url":null,"abstract":"This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75622100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing 面向云计算存储安全的数据动态密钥管理与分发技术综述
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903013849
D. Kumar, Jitendra Sheetalani
{"title":"Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing","authors":"D. Kumar, Jitendra Sheetalani","doi":"10.9790/0661-1903013849","DOIUrl":"https://doi.org/10.9790/0661-1903013849","url":null,"abstract":"Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80398863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels 基于安全级别的金融机构集成数据仓库体系结构性能研究
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903013437
Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar
{"title":"Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels","authors":"Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar","doi":"10.9790/0661-1903013437","DOIUrl":"https://doi.org/10.9790/0661-1903013437","url":null,"abstract":"The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90959371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backward Approach Development for Route Adaptive Mobile Successive Recommendation 路由自适应移动连续推荐的逆向方法开发
IOSR journal of computer engineering Pub Date : 2017-05-01 DOI: 10.9790/0661-1903032932
Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley
{"title":"Backward Approach Development for Route Adaptive Mobile Successive Recommendation","authors":"Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley","doi":"10.9790/0661-1903032932","DOIUrl":"https://doi.org/10.9790/0661-1903032932","url":null,"abstract":"The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88765357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信