首页 > 最新文献

The International Arab Journal of Information Technology最新文献

英文 中文
Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars 一种针对无人驾驶汽车目标检测模型的防御对抗样本方法研究
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/6
Ruzhi Xu, Min Li, Xin Yang, Dexin Liu, Dawei Chen
The adversarial examples make the object detection model make a wrong judgment, which threatens the security of driverless cars. In this paper, by improving the Momentum Iterative Fast Gradient Sign Method (MI-FGSM), based on ensemble learning, combined with L∞ perturbation and spatial transformation, a strong transferable black-box adversarial attack algorithm for object detection model of driverless cars is proposed. Through a large number of experiments on the nuScenes driverless dataset, it is proved that the adversarial attack algorithm proposed in this paper have strong transferability, and successfully make the mainstream object detection models such as FasterRcnn, SSD, YOLOv3 make wrong judgments. Based on the adversarial attack algorithm proposed in this paper, the parametric noise injection with adversarial training is performed to generate a defense model with strong robustness. The defense model proposed in this paper significantly improves the robustness of the object detection model. It can effectively alleviate various adversarial attacks against the object detection model of driverless cars, and does not affect the accuracy of clean samples. This is of great significance for studying the application of object detection model of driverless cars in the real physical world.
对抗性示例会使目标检测模型做出错误判断,从而威胁到无人驾驶汽车的安全性。本文通过改进基于集成学习的动量迭代快速梯度符号法(MI-FGSM),结合L∞摄动和空间变换,提出了一种针对无人驾驶汽车目标检测模型的强可转移黑盒对抗攻击算法。通过在nuScenes无人驾驶数据集上的大量实验,证明本文提出的对抗性攻击算法具有很强的可移植性,并成功使FasterRcnn、SSD、YOLOv3等主流目标检测模型做出错误判断。在本文提出的对抗攻击算法的基础上,对参数噪声注入进行对抗训练,生成具有较强鲁棒性的防御模型。本文提出的防御模型显著提高了目标检测模型的鲁棒性。它可以有效缓解针对无人驾驶汽车目标检测模型的各种对抗性攻击,并且不影响干净样本的准确性。这对于研究无人驾驶汽车目标检测模型在真实物理世界中的应用具有重要意义。
{"title":"Research on a Method of Defense Adversarial Samples for Target Detection Model of Driverless Cars","authors":"Ruzhi Xu, Min Li, Xin Yang, Dexin Liu, Dawei Chen","doi":"10.34028/iajit/20/5/6","DOIUrl":"https://doi.org/10.34028/iajit/20/5/6","url":null,"abstract":"The adversarial examples make the object detection model make a wrong judgment, which threatens the security of driverless cars. In this paper, by improving the Momentum Iterative Fast Gradient Sign Method (MI-FGSM), based on ensemble learning, combined with L∞ perturbation and spatial transformation, a strong transferable black-box adversarial attack algorithm for object detection model of driverless cars is proposed. Through a large number of experiments on the nuScenes driverless dataset, it is proved that the adversarial attack algorithm proposed in this paper have strong transferability, and successfully make the mainstream object detection models such as FasterRcnn, SSD, YOLOv3 make wrong judgments. Based on the adversarial attack algorithm proposed in this paper, the parametric noise injection with adversarial training is performed to generate a defense model with strong robustness. The defense model proposed in this paper significantly improves the robustness of the object detection model. It can effectively alleviate various adversarial attacks against the object detection model of driverless cars, and does not affect the accuracy of clean samples. This is of great significance for studying the application of object detection model of driverless cars in the real physical world.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"44 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130724459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption 一种新的用于图像加密的并行模糊多模混沌逻辑映射
Pub Date : 1900-01-01 DOI: 10.34028/iajit/18/2/12
This paper introduces a new image encryption algorithm based on a Parallel Fuzzy Multi-Modular Chaotic Logistic Map (PFMM-CLM). Firstly, a new hybrid chaotic system is introduced by using four parallel cascade chaotic logistic maps with a dynamic parameter control to achieve a high Lyapunov exponent value and completely chaotic behavior of the bifurcation diagram. Also, the fuzzy set theory is used as a fuzzy logic selector to improve chaotic performance. The proposed algorithm has been tested as a Pseudo-Random Number Generator (PRNG). The randomness test results indicate that system has better performance and satisfied all random tests. Finally, the Arnold Cat Map with controllable iterative parameters is used to enhance the confusion concept. Due to excellent chaotic properties and good randomization test results, the proposed chaotic system is used in image encryption applications. The simulation and security analysis indicate that this proposed algorithm has a very high security performance and complexity
提出了一种新的基于并行模糊多模混沌逻辑映射(PFMM-CLM)的图像加密算法。首先,采用动态参数控制的4个并联级联混沌逻辑映射构造了一种新的混合混沌系统,使分岔图具有较高的Lyapunov指数值和完全混沌行为。同时,利用模糊集理论作为模糊逻辑选择器来提高混沌性能。该算法已作为伪随机数生成器(PRNG)进行了测试。随机测试结果表明,系统具有较好的性能,满足随机测试要求。最后,利用可控制迭代参数的Arnold Cat Map增强混淆概念。由于混沌系统具有良好的混沌特性和良好的随机化测试结果,该系统被应用于图像加密中。仿真和安全性分析表明,该算法具有很高的安全性能和复杂度
{"title":"A New Parallel Fuzzy Multi Modular Chaotic Logistic Map for Image Encryption","authors":"","doi":"10.34028/iajit/18/2/12","DOIUrl":"https://doi.org/10.34028/iajit/18/2/12","url":null,"abstract":"This paper introduces a new image encryption algorithm based on a Parallel Fuzzy Multi-Modular Chaotic Logistic Map (PFMM-CLM). Firstly, a new hybrid chaotic system is introduced by using four parallel cascade chaotic logistic maps with a dynamic parameter control to achieve a high Lyapunov exponent value and completely chaotic behavior of the bifurcation diagram. Also, the fuzzy set theory is used as a fuzzy logic selector to improve chaotic performance. The proposed algorithm has been tested as a Pseudo-Random Number Generator (PRNG). The randomness test results indicate that system has better performance and satisfied all random tests. Finally, the Arnold Cat Map with controllable iterative parameters is used to enhance the confusion concept. Due to excellent chaotic properties and good randomization test results, the proposed chaotic system is used in image encryption applications. The simulation and security analysis indicate that this proposed algorithm has a very high security performance and complexity","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133284724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
الأمن الإلكتروني ضرورة ملحة لأمن المجتمعات "مقترح الأسرة الآمنة الخاص بتوعية المجتمع العربي الخليجي في أمن المعلومات لكل من الطلاب والوالدين" 网络安全是社区安全的迫切需要。
Pub Date : 1900-01-01 DOI: 10.26735/16585933.2018.001
نبيه طارق عبدالمجيد
{"title":"الأمن الإلكتروني ضرورة ملحة لأمن المجتمعات \"مقترح الأسرة الآمنة الخاص بتوعية المجتمع العربي الخليجي في أمن المعلومات لكل من الطلاب والوالدين\"","authors":"نبيه طارق عبدالمجيد","doi":"10.26735/16585933.2018.001","DOIUrl":"https://doi.org/10.26735/16585933.2018.001","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116596624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spatial and Semantic Information Enhancement for Indoor 3D Object Detection 室内三维目标检测的空间和语义信息增强
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/15
Chunmei Chen, Zhiqiang Liang, Haitao Liu, Xin Liu
Object detection technology is one of the key technologies for indoor service robots. However, due to the various types of objects in the indoor environment, the mutual occlusion between the objects is serious, which increases the difficulty of object detection. In view of the difficult challenges of object detection in the indoor environment, we propose an indoor three-dimensional object detection based on deep learning. Most existing 3D object detection techniques based on deep learning lack sufficient spatial and semantic information. To address this issue, the article presents an indoor 3D object detection method with enhanced spatial semantic information. This article proposes a new (Edge Convolution+) EdgeConv+, and based on it, a Shallow Spatial Information Enhancement module (SSIE) is added to Votenet. At the same time, a new attention mechanism, Convolutional Gated Non-Local+ (CGNL+), is designed to add Deep Semantic Information Enhancement module (DSIE) to Votenet. Experiments show that on the ScanNet dataset, the proposed method is 2.4% and 2.1% higher than Votenet at mAP@0.25 and mAP@0.5, respectively. Furthermore, it has strong robustness to deal with sparse point clouds
目标检测技术是室内服务机器人的关键技术之一。然而,由于室内环境中物体种类繁多,物体之间相互遮挡严重,增加了物体检测的难度。针对室内环境中物体检测的难点挑战,提出了一种基于深度学习的室内三维物体检测方法。现有的基于深度学习的三维目标检测技术大多缺乏足够的空间和语义信息。为了解决这一问题,本文提出了一种增强空间语义信息的室内三维物体检测方法。本文提出了一种新的(Edge Convolution+) EdgeConv+,并在此基础上为Votenet增加了一个浅空间信息增强模块(SSIE)。同时,设计了一种新的注意机制——卷积门控非局部+ (Convolutional Gated Non-Local+, CGNL+),为Votenet增加了深度语义信息增强模块(Deep Semantic Information Enhancement module, DSIE)。实验表明,在ScanNet数据集上,本文提出的方法分别比Votenet在mAP@0.25和mAP@0.5上提高2.4%和2.1%。此外,该算法对稀疏点云具有较强的鲁棒性
{"title":"Spatial and Semantic Information Enhancement for Indoor 3D Object Detection","authors":"Chunmei Chen, Zhiqiang Liang, Haitao Liu, Xin Liu","doi":"10.34028/iajit/20/5/15","DOIUrl":"https://doi.org/10.34028/iajit/20/5/15","url":null,"abstract":"Object detection technology is one of the key technologies for indoor service robots. However, due to the various types of objects in the indoor environment, the mutual occlusion between the objects is serious, which increases the difficulty of object detection. In view of the difficult challenges of object detection in the indoor environment, we propose an indoor three-dimensional object detection based on deep learning. Most existing 3D object detection techniques based on deep learning lack sufficient spatial and semantic information. To address this issue, the article presents an indoor 3D object detection method with enhanced spatial semantic information. This article proposes a new (Edge Convolution+) EdgeConv+, and based on it, a Shallow Spatial Information Enhancement module (SSIE) is added to Votenet. At the same time, a new attention mechanism, Convolutional Gated Non-Local+ (CGNL+), is designed to add Deep Semantic Information Enhancement module (DSIE) to Votenet. Experiments show that on the ScanNet dataset, the proposed method is 2.4% and 2.1% higher than Votenet at mAP@0.25 and mAP@0.5, respectively. Furthermore, it has strong robustness to deal with sparse point clouds","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130079954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Modified Technique of Hybrid Multiobjective Genetic Algorithm for Image Fusion 一种改进的混合多目标遗传算法用于图像融合
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/8
J. Kulkarni, R. Bichkar
Sensors used in image acquisition. This sensor technology is going on upgrading as per user need or as per need of an application. Multiple sensors collect the information of their respective wavelength band. But one sensor is not sufficient to acquire the complete information of one scene. To gain the overall data of one part, it becomes essential to cartel the images from multiple sources. This is achieved through merging. It is the method of merging the data from dissimilar input sources to create a more informative image compared with an image from a single input source. These are multisensor photos e.g., panchromatic and multispectral images. The first image offers spatial records whereas the lateral image offers spectral data. Through visible inspections, the panchromatic photo is clearer than a multispectral photo however the grey shade image is. Articles are greater clear however nownot recognized whereasmultispectral picture displays one of a kind shades however performing distortion. So comparing the characteristics of these two images, the resultant image is greater explanatory than these enter images. Fusion is done using different transform methods as well as the Genetic Algorithm (GA). Comparing the results obtained by these methods, the output image by the GA is clearer. The feature of the resultant image is verified through parameters such as Root Mean Square Error (RMSE), peak signal to noise ratio, Mutual Information (MI), and Spatial Frequency (SF). In the subjective analysis, some transform techniques also giving exact fused images. The hybrid approach combines the transform technique and a GA is used for image fusion. This is again compared with GA results. The same performance parameters are used. And it is observed that the Hybrid Genetic Algorithm (HGA) is superior tothe AG. Here the only RMSE parameter is considered under the fitness function of the GA so only this parameter is far better than the remaining parameters. If we consider all parameters in the fitness function of the GA then all parameters using a HGA will give better performance. This method is called a Hybrid Multiobjective Genetic Algorithm (HMOGA) [14].
用于图像采集的传感器。这种传感器技术正在根据用户的需要或应用程序的需要进行升级。多个传感器采集各自波长波段的信息。但是一个传感器不足以获取一个场景的完整信息。为了获得一个部分的整体数据,必须将来自多个来源的图像合并在一起。这是通过合并实现的。它是一种合并来自不同输入源的数据以创建比来自单一输入源的图像更有信息量的图像的方法。这些是多传感器照片,如全色和多光谱图像。第一幅图像提供空间记录,而横向图像提供光谱数据。通过可见光检查,全色照片比多光谱照片更清晰,而灰色阴影图像则更清晰。文章更清晰,但现在不被识别,而多光谱图像显示一种色调,但表现出失真。因此,比较这两幅图像的特征,合成图像比这些输入图像更具解释性。采用不同的变换方法和遗传算法进行融合。对比两种方法得到的结果,遗传算法输出的图像更加清晰。通过均方根误差(RMSE)、峰值信噪比、互信息(MI)和空间频率(SF)等参数验证所得图像的特征。在主观分析中,一些变换技术也给出了精确的融合图像。该方法结合变换技术和遗传算法进行图像融合。这再次与GA结果进行了比较。使用相同的性能参数。结果表明,混合遗传算法(HGA)优于遗传算法(AG)。这里唯一的RMSE参数是在GA的适应度函数下考虑的,所以只有这个参数远远好于其他参数。如果我们在遗传算法的适应度函数中考虑所有参数,那么使用HGA的所有参数将得到更好的性能。这种方法被称为混合多目标遗传算法(Hybrid Multiobjective Genetic Algorithm, HMOGA)[14]。
{"title":"A Modified Technique of Hybrid Multiobjective Genetic Algorithm for Image Fusion","authors":"J. Kulkarni, R. Bichkar","doi":"10.34028/iajit/20/5/8","DOIUrl":"https://doi.org/10.34028/iajit/20/5/8","url":null,"abstract":"Sensors used in image acquisition. This sensor technology is going on upgrading as per user need or as per need of an application. Multiple sensors collect the information of their respective wavelength band. But one sensor is not sufficient to acquire the complete information of one scene. To gain the overall data of one part, it becomes essential to cartel the images from multiple sources. This is achieved through merging. It is the method of merging the data from dissimilar input sources to create a more informative image compared with an image from a single input source. These are multisensor photos e.g., panchromatic and multispectral images. The first image offers spatial records whereas the lateral image offers spectral data. Through visible inspections, the panchromatic photo is clearer than a multispectral photo however the grey shade image is. Articles are greater clear however nownot recognized whereasmultispectral picture displays one of a kind shades however performing distortion. So comparing the characteristics of these two images, the resultant image is greater explanatory than these enter images. Fusion is done using different transform methods as well as the Genetic Algorithm (GA). Comparing the results obtained by these methods, the output image by the GA is clearer. The feature of the resultant image is verified through parameters such as Root Mean Square Error (RMSE), peak signal to noise ratio, Mutual Information (MI), and Spatial Frequency (SF). In the subjective analysis, some transform techniques also giving exact fused images. The hybrid approach combines the transform technique and a GA is used for image fusion. This is again compared with GA results. The same performance parameters are used. And it is observed that the Hybrid Genetic Algorithm (HGA) is superior tothe AG. Here the only RMSE parameter is considered under the fitness function of the GA so only this parameter is far better than the remaining parameters. If we consider all parameters in the fitness function of the GA then all parameters using a HGA will give better performance. This method is called a Hybrid Multiobjective Genetic Algorithm (HMOGA) [14].","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117335080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security 一种利用生物特征密钥保证数据安全的有效混合加密模型
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/12
S. Arumugam
Cybersecurity becomes a key concern in many applications as cybercrimes exploit system weaknesses. Cryptography helps protect sensitive data in everyday transactions and communications using passwords or tokens. However, the power of the encryption/decryption algorithms always depends on their ability to secure the data in any situation. This paper presents an effective hybrid encryption/decryption model that makes use of a biometric key along with an effective password to ensure data security. The biometric key utilised in the proposed model is generated from the fingerprint, which is a unique physical characteristic of an individual. The model initially encodes the data to be securely transmitted. The symmetric key encryption that makes use of a biometric key is applied over the encoded data. Another layer of defence is built by applying asymmetric key encryption to the encrypted data along with the details of the fingerprint. The Advanced Encryption Standard (AES) algorithm and Elgamal Encryption using Elliptical Curve Cryptography (E3C2) are used for symmetric and asymmetric encryptions. Experimental analysis is performed to analyse the model's computing speed and security and is compared with existing models and encoding/encryption techniques
随着网络犯罪利用系统弱点,网络安全在许多应用中成为一个关键问题。密码学使用密码或令牌帮助保护日常交易和通信中的敏感数据。然而,加密/解密算法的能力总是取决于它们在任何情况下保护数据的能力。本文提出了一种有效的混合加解密模型,该模型利用生物特征密钥和有效密码来保证数据的安全性。所提出的模型中使用的生物识别密钥是从指纹生成的,指纹是个体的唯一物理特征。模型首先对要安全传输的数据进行编码。利用生物识别密钥的对称密钥加密应用于编码的数据。另一层防御是通过对加密数据和指纹细节应用非对称密钥加密来构建的。对称加密和非对称加密采用AES (Advanced Encryption Standard)算法和E3C2 (Elgamal Encryption using ellipmcurve Cryptography)算法。实验分析了该模型的计算速度和安全性,并与现有模型和编码/加密技术进行了比较
{"title":"An Effective Hybrid Encryption Model using Biometric Key for Ensuring Data Security","authors":"S. Arumugam","doi":"10.34028/iajit/20/5/12","DOIUrl":"https://doi.org/10.34028/iajit/20/5/12","url":null,"abstract":"Cybersecurity becomes a key concern in many applications as cybercrimes exploit system weaknesses. Cryptography helps protect sensitive data in everyday transactions and communications using passwords or tokens. However, the power of the encryption/decryption algorithms always depends on their ability to secure the data in any situation. This paper presents an effective hybrid encryption/decryption model that makes use of a biometric key along with an effective password to ensure data security. The biometric key utilised in the proposed model is generated from the fingerprint, which is a unique physical characteristic of an individual. The model initially encodes the data to be securely transmitted. The symmetric key encryption that makes use of a biometric key is applied over the encoded data. Another layer of defence is built by applying asymmetric key encryption to the encrypted data along with the details of the fingerprint. The Advanced Encryption Standard (AES) algorithm and Elgamal Encryption using Elliptical Curve Cryptography (E3C2) are used for symmetric and asymmetric encryptions. Experimental analysis is performed to analyse the model's computing speed and security and is compared with existing models and encoding/encryption techniques","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123461796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-level Attack with Dynamic S-box Variable key Pattern Generation for Key Cohort Using AES 基于AES的密钥队列动态s盒可变密钥模式生成多级攻击
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/7
Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam
In recent times, data transmission in electronic medium is found to be more susceptible to several attacks. The study aims to control the multi-level attacks in encryption and decryption process by using Advanced Encryption Standard (AES) algorithm based S box operations. In AES based variable key generation pattern, every round generates the new key. The generation of multiple keys strengthen the operation of AES-dynamic S box. The AES algorithm performs operation on a 128 bit plain text and utilizes identical key for decryption and encryption process. The proposed algorithm shows significant improvements in the quality of encryption and decryption. The performance of the proposed system has been analysed in accordance with delay, power consumption and number of slices. Further the efficiency of the proposed system has been compared with other existing methods such as Positive Polarity Reed Muller (PPRM), Modified Positive Polarity Reed Muller (MPPRM) Twisted Binary Decision Diagram (TBDD) and Composite Field (CF) architecture. The results exposed that the proposed system outperforms with superior performance.
近年来,人们发现电子介质中的数据传输更容易受到几种攻击。本研究旨在利用基于S盒操作的高级加密标准(Advanced encryption Standard, AES)算法控制加解密过程中的多级攻击。在基于AES的可变密钥生成模式中,每轮生成一个新的密钥。多密钥的生成加强了aes动态S盒的可操作性。AES算法对128位明文进行操作,使用相同的密钥进行解密和加密。该算法在加密和解密质量上有显著提高。根据时延、功耗和片数对系统性能进行了分析。并与现有的正极性Reed Muller (PPRM)、修正正极性Reed Muller (MPPRM)、扭曲二值决策图(TBDD)和复合场(CF)结构进行了效率比较。结果表明,该系统具有优异的性能。
{"title":"Multi-level Attack with Dynamic S-box Variable key Pattern Generation for Key Cohort Using AES","authors":"Anusha Padmavathi Rajendran, Dhanalakshmi Krishnan Sadhasivam","doi":"10.34028/iajit/20/5/7","DOIUrl":"https://doi.org/10.34028/iajit/20/5/7","url":null,"abstract":"In recent times, data transmission in electronic medium is found to be more susceptible to several attacks. The study aims to control the multi-level attacks in encryption and decryption process by using Advanced Encryption Standard (AES) algorithm based S box operations. In AES based variable key generation pattern, every round generates the new key. The generation of multiple keys strengthen the operation of AES-dynamic S box. The AES algorithm performs operation on a 128 bit plain text and utilizes identical key for decryption and encryption process. The proposed algorithm shows significant improvements in the quality of encryption and decryption. The performance of the proposed system has been analysed in accordance with delay, power consumption and number of slices. Further the efficiency of the proposed system has been compared with other existing methods such as Positive Polarity Reed Muller (PPRM), Modified Positive Polarity Reed Muller (MPPRM) Twisted Binary Decision Diagram (TBDD) and Composite Field (CF) architecture. The results exposed that the proposed system outperforms with superior performance.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125013765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset 多神经网络优化器在物联网传感器火灾数据集上的性能比较
Pub Date : 1900-01-01 DOI: 10.34028/iajit/20/5/9
Sudip Suklabaidya, Indrani Das
In today's world, fires in homes and commercial places are a serious problem that can harm the local environment as well as jeopardize people's property and lives. This study predicts the sensor dataset gained from an integrated sensor framework with an artificial neural network. The major goal of this research was to identify a convenient way to encode input data that balanced information loss with simplicity. This paper developed an Artificial Neural Network (ANN) model and applied it to the fire dataset collected from the Integrated Sensor System (ISS). Every neuron of the model will learn and hold weights that weigh information, which provides better accuracy. To mitigate loss functions and improve accuracy, various activation functions such as Sigmoid, Relu, and optimizer Stochastic Gradient Descent (SGD), Adam, and Adamax are used in the designed model. The results demonstrated that the prediction accuracy of the ANN model with Adam as the optimizer is better than that of the other two optimizers. The findings also show that the ANN model performs well in terms of prediction accuracy and is also better suited to the sensor fire dataset
在当今世界,家庭和商业场所的火灾是一个严重的问题,它不仅会危害当地环境,还会危及人们的财产和生命。本研究利用人工神经网络预测从集成传感器框架中获得的传感器数据集。本研究的主要目标是确定一种方便的方法来编码输入数据,以简单的方式平衡信息丢失。本文建立了一种人工神经网络(ANN)模型,并将其应用于综合传感器系统(ISS)采集的火灾数据集。模型的每个神经元都将学习并持有加权信息的权重,从而提供更好的准确性。为了减轻损失函数并提高精度,在设计的模型中使用了各种激活函数,如Sigmoid, Relu和优化器随机梯度下降(SGD), Adam和Adamax。结果表明,以Adam为优化器的人工神经网络模型的预测精度优于其他两种优化器。研究结果还表明,人工神经网络模型在预测精度方面表现良好,也更适合传感器火灾数据集
{"title":"Performance Comparison of Multiple ANN Optimizer on IoT-enabled Sensor Fire Dataset","authors":"Sudip Suklabaidya, Indrani Das","doi":"10.34028/iajit/20/5/9","DOIUrl":"https://doi.org/10.34028/iajit/20/5/9","url":null,"abstract":"In today's world, fires in homes and commercial places are a serious problem that can harm the local environment as well as jeopardize people's property and lives. This study predicts the sensor dataset gained from an integrated sensor framework with an artificial neural network. The major goal of this research was to identify a convenient way to encode input data that balanced information loss with simplicity. This paper developed an Artificial Neural Network (ANN) model and applied it to the fire dataset collected from the Integrated Sensor System (ISS). Every neuron of the model will learn and hold weights that weigh information, which provides better accuracy. To mitigate loss functions and improve accuracy, various activation functions such as Sigmoid, Relu, and optimizer Stochastic Gradient Descent (SGD), Adam, and Adamax are used in the designed model. The results demonstrated that the prediction accuracy of the ANN model with Adam as the optimizer is better than that of the other two optimizers. The findings also show that the ANN model performs well in terms of prediction accuracy and is also better suited to the sensor fire dataset","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127310729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
اجراءات القبول والالتحاق ببرامج الماجستير في الجامعات المتناظرة المحلية والإقليمية بكليات علوم الحاسب : دراسة مقارنة 当地和区域计算机科学学院的硕士课程的录取和录取程序:比较研究
Pub Date : 1900-01-01 DOI: 10.26735/16585933.2018.003
أ بوفاس الشريف, مريم عمّي
{"title":"اجراءات القبول والالتحاق ببرامج الماجستير في الجامعات المتناظرة المحلية والإقليمية بكليات علوم الحاسب : دراسة مقارنة","authors":"أ بوفاس الشريف, مريم عمّي","doi":"10.26735/16585933.2018.003","DOIUrl":"https://doi.org/10.26735/16585933.2018.003","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130283123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
التعاملات الإلكترونية ودورها في التنمية الإدارية من وجهة نظر العاملين بإمارة منطقة الباحة 从园区管理人员的角度看,电子交易及其在管理发展中的作用
Pub Date : 1900-01-01 DOI: 10.26735/16585933.2018.005
أحمد عبدالله أحمد موالا العُمري, حسين يوسف أبو منصور
{"title":"التعاملات الإلكترونية ودورها في التنمية الإدارية من وجهة نظر العاملين بإمارة منطقة الباحة","authors":"أحمد عبدالله أحمد موالا العُمري, حسين يوسف أبو منصور","doi":"10.26735/16585933.2018.005","DOIUrl":"https://doi.org/10.26735/16585933.2018.005","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130140665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
The International Arab Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1