首页 > 最新文献

2019 First International Conference of Computer and Applied Sciences (CAS)最新文献

英文 中文
Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET 面向MANET的AODV路由协议中轻量级流密码的实现
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075669
Nooralhuda waheed Aziz, S. N. Alsaad, Haider kadhum Hmood
The growing use of MANETs and its vulnerability to attacks due to its fundamental characteristics make secure routing one of the most considerable challenges. In this paper, a new security scheme for mobile ad hoc networks (MANETs) is presented. The proposed scheme used Trivium lightweight stream cipher algorithm in combination with HMAC to secure the routing control packets. This paper compares the performance of the AODV after implementing the security scheme in terms of throughput, delay sum (end-to-end), jitter sum (end-to-end) and packet loss ratio. The proposed scheme shows better performance than original AODV under blackhole attack.
manet的使用越来越多,由于其基本特征,它容易受到攻击,这使得安全路由成为最重大的挑战之一。本文提出了一种新的移动自组织网络(manet)安全方案。该方案采用Trivium轻量级流密码算法,结合HMAC对路由控制报文进行安全保护。本文从吞吐量、延迟和(端到端)、抖动和(端到端)和丢包率等方面比较了实现安全方案后AODV的性能。该方案在黑洞攻击下的性能优于原AODV算法。
{"title":"Implementation of Lightweight Stream Cipher in AODV Routing Protocol for MANET","authors":"Nooralhuda waheed Aziz, S. N. Alsaad, Haider kadhum Hmood","doi":"10.1109/CAS47993.2019.9075669","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075669","url":null,"abstract":"The growing use of MANETs and its vulnerability to attacks due to its fundamental characteristics make secure routing one of the most considerable challenges. In this paper, a new security scheme for mobile ad hoc networks (MANETs) is presented. The proposed scheme used Trivium lightweight stream cipher algorithm in combination with HMAC to secure the routing control packets. This paper compares the performance of the AODV after implementing the security scheme in terms of throughput, delay sum (end-to-end), jitter sum (end-to-end) and packet loss ratio. The proposed scheme shows better performance than original AODV under blackhole attack.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127689623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Combination of Two-Dimensional Hénon Map and Two-Dimensional Rational Map as Key Number Generator
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075731
Naeem Howrie Ghayad, Ekhlas Abbas Albahrani
Random numbers are utilised principally to create random strings or secure secret keys. The key is a very important part of encryption and depends on the strength and security in the encryption algorithm. Random number generators have used in a computer simulation, cryptography, statistical modelling, randomised design, and other areas where the production of an unexpected result is desirable. This paper aims to provide designing a new random key generator form on a concatenation between Two- Dimensional Hénon map and Two-Dimensional rational Map. The basic process of the proposed generator is to convert the output of the two chaotic maps into 64-bit numbers and to merge them with the XOR operation and other operations. The key resulted random sequences are studied by the NIST test group and also using the traditional statistical methods.
随机数主要用于创建随机字符串或安全密钥。密钥是加密中非常重要的一部分,它取决于加密算法的强度和安全性。随机数生成器已用于计算机模拟、密码学、统计建模、随机设计和其他需要产生意外结果的领域。本文的目的是在二维hsamnon映射和二维有理映射的连接上设计一种新的随机密钥生成形式。所提出的生成器的基本过程是将两个混沌映射的输出转换为64位数字,并与异或操作和其他操作合并。关键结果随机序列由NIST试验组在传统统计方法的基础上进行研究。
{"title":"A Combination of Two-Dimensional Hénon Map and Two-Dimensional Rational Map as Key Number Generator","authors":"Naeem Howrie Ghayad, Ekhlas Abbas Albahrani","doi":"10.1109/CAS47993.2019.9075731","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075731","url":null,"abstract":"Random numbers are utilised principally to create random strings or secure secret keys. The key is a very important part of encryption and depends on the strength and security in the encryption algorithm. Random number generators have used in a computer simulation, cryptography, statistical modelling, randomised design, and other areas where the production of an unexpected result is desirable. This paper aims to provide designing a new random key generator form on a concatenation between Two- Dimensional Hénon map and Two-Dimensional rational Map. The basic process of the proposed generator is to convert the output of the two chaotic maps into 64-bit numbers and to merge them with the XOR operation and other operations. The key resulted random sequences are studied by the NIST test group and also using the traditional statistical methods.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129940422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing Data Transmission To Improve Lifetime of Wireless Sensor Network 管理数据传输以提高无线传感器网络的寿命
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075466
S. Abbas, Israa M. Khanjar
Wireless sensor network (WSN) is a set of small sensor nodes with a limited amount of energy that is randomly deployed in an area of interest to transmit massive data. One of the main objectives of designing wireless sensor network is to make data transmission effective to increase network longevity and avoid premature death of nodes through energy management methods. In this paper, an energy-efficient routing scheme for WSN is proposed based on fuzzy logic for selecting a cluster head (CH), Node remaining energy and a distance of the Node to the base station (BS). The distance to the cluster head is taken into account as the inputs to be fed into the fuzzy inference system to determine the cluster heads. We also suggested an approach to managing the data transmission in a wireless sensor network to decrease the overall energy consumed; thus, extending the network lifetime. The performance of the proposed approach is evaluated using MATLAB simulation tool and compared with the LEACH protocol. Simulation results illustrated that the proposed protocol works better than LEACH regarding energy consumption and extending the network lifetime.
无线传感器网络(WSN)是一组具有有限能量的小型传感器节点,随机部署在感兴趣的区域以传输大量数据。无线传感器网络设计的主要目标之一是通过能量管理方法使数据有效传输,从而延长网络寿命,避免节点过早死亡。本文提出了一种基于模糊逻辑选择簇头(CH)、节点剩余能量以及节点到基站距离(BS)的WSN节能路由方案。将到簇头的距离作为模糊推理系统的输入来确定簇头。我们还提出了一种管理无线传感器网络中的数据传输的方法,以降低总体能耗;从而延长了网络生命周期。利用MATLAB仿真工具对该方法的性能进行了评估,并与LEACH协议进行了比较。仿真结果表明,该协议在能耗和延长网络寿命方面优于LEACH协议。
{"title":"Managing Data Transmission To Improve Lifetime of Wireless Sensor Network","authors":"S. Abbas, Israa M. Khanjar","doi":"10.1109/CAS47993.2019.9075466","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075466","url":null,"abstract":"Wireless sensor network (WSN) is a set of small sensor nodes with a limited amount of energy that is randomly deployed in an area of interest to transmit massive data. One of the main objectives of designing wireless sensor network is to make data transmission effective to increase network longevity and avoid premature death of nodes through energy management methods. In this paper, an energy-efficient routing scheme for WSN is proposed based on fuzzy logic for selecting a cluster head (CH), Node remaining energy and a distance of the Node to the base station (BS). The distance to the cluster head is taken into account as the inputs to be fed into the fuzzy inference system to determine the cluster heads. We also suggested an approach to managing the data transmission in a wireless sensor network to decrease the overall energy consumed; thus, extending the network lifetime. The performance of the proposed approach is evaluated using MATLAB simulation tool and compared with the LEACH protocol. Simulation results illustrated that the proposed protocol works better than LEACH regarding energy consumption and extending the network lifetime.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131734064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Proposed Implementation of Raptor Code using a Microcontroller Raptor代码在微控制器上的实现
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075714
S. Sadkhan, Lafta Akeel A. Lafta
This paper, discuss raptor code implementation using a microcontroller. The work considers raptor code constructed from serial concatenation between two codes; these two codes are error-correcting. The first code is the low-density parity-check code LDPC code, and the second is the Luby transform code LT code. This work focus on compatibility concept of serially concatenated codes. The compatibility between two codes considers the matching of the code rate between two serially concatenated codes. The work discusses multiple cases of code rates with different modulation schemes. The simulation of each case of serial concatenation investigated and analyses using MATLAB. The simulation results show that raptor code provides excellent performance of Bit error rate BER vs SNR through AWGN channel. This work also introduces the raptor code implementation using a microcontroller. The implementation includes both raptor code system transmitter and receiver. The implementation uses a bit flipping decoding algorithm in the system receiver. The raptor code implementation tested in both transmitter and receiver using random input data; the decoding process provides output precisely the same as the input message without errors.
本文讨论了利用单片机实现猛禽代码。该工作考虑了由两个代码之间的串行连接构造的猛禽代码;这两个代码是纠错的。第一个码是低密度奇偶校验码LDPC码,第二个码是鲁比变换码LT码。本文重点研究了串行连接代码的兼容性概念。码间兼容性考虑的是两个串行连接码间码率的匹配。本文讨论了不同调制方案下码率的多种情况。利用MATLAB对串行连接的各种情况进行了仿真研究和分析。仿真结果表明,raptor码在AWGN信道中具有良好的误码率BER和信噪比性能。本文还介绍了利用单片机实现猛禽代码的方法。实现包括猛禽码系统的发送端和接收端。该实现在系统接收机中使用了位翻转解码算法。使用随机输入数据在发送器和接收器上测试了猛禽代码实现;解码过程提供的输出与输入消息完全相同,没有错误。
{"title":"A Proposed Implementation of Raptor Code using a Microcontroller","authors":"S. Sadkhan, Lafta Akeel A. Lafta","doi":"10.1109/CAS47993.2019.9075714","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075714","url":null,"abstract":"This paper, discuss raptor code implementation using a microcontroller. The work considers raptor code constructed from serial concatenation between two codes; these two codes are error-correcting. The first code is the low-density parity-check code LDPC code, and the second is the Luby transform code LT code. This work focus on compatibility concept of serially concatenated codes. The compatibility between two codes considers the matching of the code rate between two serially concatenated codes. The work discusses multiple cases of code rates with different modulation schemes. The simulation of each case of serial concatenation investigated and analyses using MATLAB. The simulation results show that raptor code provides excellent performance of Bit error rate BER vs SNR through AWGN channel. This work also introduces the raptor code implementation using a microcontroller. The implementation includes both raptor code system transmitter and receiver. The implementation uses a bit flipping decoding algorithm in the system receiver. The raptor code implementation tested in both transmitter and receiver using random input data; the decoding process provides output precisely the same as the input message without errors.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127671313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Energy Efficient Double Chain-based Routing Protocol using ACO 基于蚁群算法的改进节能双链路由协议
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075758
A. A. Hussein, R. A. Abd Khalid
There is no adopt that WSN affects strongly different applications and technologies, but with time a rapid changing is raised in networks and communication field developments. Therefore, many constraints are shows in WSN, one of these constraints and the most affected one is energy consumption; thus, as an inevitable result, these constraints should be overcome. Improvement of routing protocols in WSN can handle these constraints proficiently. In this paper, DDIEEPB and DDIEEPB-ACO (Double chain Double sink node Improved Energy Efficient PEGASIS protocol) using ACO (Ant Colony Optimization algorithm) is proposed. Simulation in Matlab proves that compared with the core protocol PEGASIS and the supported protocol IEEPB, DDIEEPB and DDIEEPB-ACO reduces the energy dissipation, enhance node survival rate, and prolong the network life cycle. The proposed protocols show good scalability, and it is suitable for the large-scale network.
没有人认为无线传感器网络会对不同的应用和技术产生强烈的影响,但随着时间的推移,网络和通信领域的发展日新月异。因此,在无线传感器网络中表现出许多制约因素,其中影响最大的制约因素是能耗;因此,作为一个不可避免的结果,这些限制应该被克服。无线传感器网络中路由协议的改进可以有效地处理这些约束。本文提出了基于蚁群优化算法的DDIEEPB和DDIEEPB-ACO(双链双汇节点改进能源效率PEGASIS协议)。Matlab仿真证明,与核心协议PEGASIS和支持协议IEEPB相比,DDIEEPB和DDIEEPB- aco减少了能量消耗,提高了节点存活率,延长了网络生命周期。所提出的协议具有良好的可扩展性,适用于大规模网络。
{"title":"An Improved Energy Efficient Double Chain-based Routing Protocol using ACO","authors":"A. A. Hussein, R. A. Abd Khalid","doi":"10.1109/CAS47993.2019.9075758","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075758","url":null,"abstract":"There is no adopt that WSN affects strongly different applications and technologies, but with time a rapid changing is raised in networks and communication field developments. Therefore, many constraints are shows in WSN, one of these constraints and the most affected one is energy consumption; thus, as an inevitable result, these constraints should be overcome. Improvement of routing protocols in WSN can handle these constraints proficiently. In this paper, DDIEEPB and DDIEEPB-ACO (Double chain Double sink node Improved Energy Efficient PEGASIS protocol) using ACO (Ant Colony Optimization algorithm) is proposed. Simulation in Matlab proves that compared with the core protocol PEGASIS and the supported protocol IEEPB, DDIEEPB and DDIEEPB-ACO reduces the energy dissipation, enhance node survival rate, and prolong the network life cycle. The proposed protocols show good scalability, and it is suitable for the large-scale network.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126683553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach For Expansion the Throughput Capacity of the Quick Response Code 一种扩展快速响应码吞吐量的新方法
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075492
Ammar Mohammed Saeed Ali, A. Farhan
QR code has emerged as strong platforms, and powerful for a large-scale field of scientific and industrial processes.it can execute an essential part in addressing the subject of authentication. QR codes are applied in domains that affect the transfer of text information, and these include-mail messages, phone numbers, hyperlinks or another text file, This pursuit has thus been helpful in our knowledge towards obtaining an adequate and inexpensive method that does not require a high level of training. A key aspect of this work is thus to propose a new method to succeed in the deficiencies of the limited size of the traditional QR code. It relies on the features of the Shannon-Fano encoding algorithm to decrease the size of the input data and the principles of the XOR function. The main structure of this paper can be summarised in the following sections. First, it deals with the handling of an authentication system. The second section deals with the enhancement of the QR code to promote the data storage capacity. The last section of this paper deals with the display of the experiment's results and discusses. The suggested algorithm was explained in the schemes of several aspects, such as the secrecy aspect, the durability aspect, the complexity aspect, and the storage capacity. In this work, the proposed QR code does not reproduce the configuration or structure of the QR code. Indeed, the experimental results of this paper produced better findings of a great deal of the previous work.
二维码已经成为强大的平台,对于大规模的科学和工业流程领域来说是强大的。它可以执行处理身份验证主体的重要部分。QR码应用于影响文本信息传输的领域,包括邮件信息、电话号码、超链接或另一个文本文件。因此,这种追求有助于我们获得一种充分且廉价的方法,不需要高水平的培训。因此,这项工作的一个关键方面是提出了一种新的方法来克服传统QR码尺寸有限的不足。它依靠香农-范诺编码算法的特点来减小输入数据的大小和异或函数的原理。本文的主要结构可以概括在以下几节中。首先,它处理身份验证系统的处理。第二部分是对二维码的增强,以提升数据存储容量。论文的最后一部分是实验结果的展示和讨论。从保密性、持久性、复杂度和存储容量等方面对该算法进行了说明。在这项工作中,提议的QR码不复制QR码的配置或结构。的确,这篇论文的实验结果比以前的许多工作得出了更好的结论。
{"title":"A New Approach For Expansion the Throughput Capacity of the Quick Response Code","authors":"Ammar Mohammed Saeed Ali, A. Farhan","doi":"10.1109/CAS47993.2019.9075492","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075492","url":null,"abstract":"QR code has emerged as strong platforms, and powerful for a large-scale field of scientific and industrial processes.it can execute an essential part in addressing the subject of authentication. QR codes are applied in domains that affect the transfer of text information, and these include-mail messages, phone numbers, hyperlinks or another text file, This pursuit has thus been helpful in our knowledge towards obtaining an adequate and inexpensive method that does not require a high level of training. A key aspect of this work is thus to propose a new method to succeed in the deficiencies of the limited size of the traditional QR code. It relies on the features of the Shannon-Fano encoding algorithm to decrease the size of the input data and the principles of the XOR function. The main structure of this paper can be summarised in the following sections. First, it deals with the handling of an authentication system. The second section deals with the enhancement of the QR code to promote the data storage capacity. The last section of this paper deals with the display of the experiment's results and discusses. The suggested algorithm was explained in the schemes of several aspects, such as the secrecy aspect, the durability aspect, the complexity aspect, and the storage capacity. In this work, the proposed QR code does not reproduce the configuration or structure of the QR code. Indeed, the experimental results of this paper produced better findings of a great deal of the previous work.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121846315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Posteriori $L_{infty}(H^{1})$ Error Bound in Finite Element Approximation of Semdiscrete Semilinear Parabolic Problems 半离散半线性抛物型问题有限元逼近的后验$L_{infty}(H^{1})$误差界
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075699
Younis A. Sabawi
This work aims to construct a posteriori error bounds for semidiscrete semilinear parabolic problems in terms of $L$∞ (H1) norm. The curtail idea is to adapt the elliptic reconstruction technique introduced by Makridakis and Nochetto [8], this allows us to use error estimators derived for elliptic problems in order to obtain parabolic estimators that are of optimal order in space and time for non-Lipschitz nonlinearities, using relevant Sobolev Imbedding through continuation argument. These error bounds are subsequently used to reduce the computational of the scheme.
本文的目的是构造一个半离散半线性抛物问题在$L$∞(H1)范数下的后验误差界。缩减思路是采用Makridakis和Nochetto[8]引入的椭圆重建技术,这使得我们可以使用为椭圆问题导出的误差估计量,通过延拓论证使用相关的Sobolev嵌入来获得非lipschitz非线性在空间和时间上具有最优阶的抛物估计量。这些误差范围随后被用来减少方案的计算量。
{"title":"A Posteriori $L_{infty}(H^{1})$ Error Bound in Finite Element Approximation of Semdiscrete Semilinear Parabolic Problems","authors":"Younis A. Sabawi","doi":"10.1109/CAS47993.2019.9075699","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075699","url":null,"abstract":"This work aims to construct a posteriori error bounds for semidiscrete semilinear parabolic problems in terms of $L$∞ (H1) norm. The curtail idea is to adapt the elliptic reconstruction technique introduced by Makridakis and Nochetto [8], this allows us to use error estimators derived for elliptic problems in order to obtain parabolic estimators that are of optimal order in space and time for non-Lipschitz nonlinearities, using relevant Sobolev Imbedding through continuation argument. These error bounds are subsequently used to reduce the computational of the scheme.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123298408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Stream Cipher Based on Chaotic Maps 基于混沌映射的流密码
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075490
Eman L. Mohaisen, R. S. Mohammed
Information Security has still the aim of many agencies and organisations. They have great attention to cryptosystems to ensure the security of their information. So, scientists and researchers had proposed many cryptosystems and improve their performance via new methods and techniques. Most recent studies depended on the chaotic map with cipher systems which had gained most researchers to improve its security and robustness. The continued studies had mentioned several methods to strength these chaotic based ciphers and the randomness of its keystream generation. Some of the studies had proposed successful cipher techniques while others had not or advised further improvement. Another side, this paper tests chaotic maps which had used in the cipher algorithms to evaluate its randomness. In general, this paper gives a review of recent stream cipher based on chaotic maps. It also shows the randomness evaluation of chaotic maps. The survey recommended that Chen map is the most random method.
资讯安全仍然是许多机构和组织的目标。他们非常重视密码系统,以确保他们的信息安全。因此,科学家和研究人员提出了许多密码系统,并通过新的方法和技术提高了它们的性能。近年来对混沌映射密码系统的研究主要集中在提高混沌映射的安全性和鲁棒性上。在后续的研究中,提出了几种增强混沌密码及其密钥流生成随机性的方法。一些研究提出了成功的密码技术,而另一些则没有或建议进一步改进。另一方面,本文对密码算法中使用的混沌映射进行了检验,以评价其随机性。综述了近年来基于混沌映射的流密码的研究进展。给出了混沌映射的随机性评价。该调查建议陈图是最随机的方法。
{"title":"Stream Cipher Based on Chaotic Maps","authors":"Eman L. Mohaisen, R. S. Mohammed","doi":"10.1109/CAS47993.2019.9075490","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075490","url":null,"abstract":"Information Security has still the aim of many agencies and organisations. They have great attention to cryptosystems to ensure the security of their information. So, scientists and researchers had proposed many cryptosystems and improve their performance via new methods and techniques. Most recent studies depended on the chaotic map with cipher systems which had gained most researchers to improve its security and robustness. The continued studies had mentioned several methods to strength these chaotic based ciphers and the randomness of its keystream generation. Some of the studies had proposed successful cipher techniques while others had not or advised further improvement. Another side, this paper tests chaotic maps which had used in the cipher algorithms to evaluate its randomness. In general, this paper gives a review of recent stream cipher based on chaotic maps. It also shows the randomness evaluation of chaotic maps. The survey recommended that Chen map is the most random method.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134152282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for Detection and Identification the Components of Arguments in Arabic Legal Texts 阿拉伯法律文本中论点成分的检测和识别框架
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075650
K. Jasim, A. Sadiq, Hasanen S. Abdullah
Argument mining processes in the legal domain it is aiming to detect and extract the premises, claims and their relations automatically from unstructured legal texts to provide structured data that can be processable by argumentation models. This paper presents a framework to detect and identify the components of arguments in texts of Arabic legal documents. The framework proposes a computational model adopts the supervised learning that integrates an annotated Arabic Legal Text corpus (ALTC), it is a collection of Iraq's Federal Court of Cassation decision documents with different binary classifiers based on relevant features to detect and identify the components of arguments from legal decisions texts as a final goal. The results of the framework experiments are promising, especially this paper is the first in argumentation mining processing at the level of the Arabic texts.
法律领域的论证挖掘过程旨在从非结构化的法律文本中自动检测和提取前提、主张及其关系,以提供可由论证模型处理的结构化数据。本文提出了一个框架来检测和识别阿拉伯法律文件文本中论点的组成部分。该框架提出了一个采用监督学习的计算模型,该模型集成了注释阿拉伯法律文本语料库(ALTC),它是伊拉克联邦上诉法院判决文件的集合,具有基于相关特征的不同二元分类器,以检测和识别法律判决文本中的论点组成部分为最终目标。该框架的实验结果令人满意,特别是本文首次在阿拉伯语文本层面进行了论证挖掘处理。
{"title":"A Framework for Detection and Identification the Components of Arguments in Arabic Legal Texts","authors":"K. Jasim, A. Sadiq, Hasanen S. Abdullah","doi":"10.1109/CAS47993.2019.9075650","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075650","url":null,"abstract":"Argument mining processes in the legal domain it is aiming to detect and extract the premises, claims and their relations automatically from unstructured legal texts to provide structured data that can be processable by argumentation models. This paper presents a framework to detect and identify the components of arguments in texts of Arabic legal documents. The framework proposes a computational model adopts the supervised learning that integrates an annotated Arabic Legal Text corpus (ALTC), it is a collection of Iraq's Federal Court of Cassation decision documents with different binary classifiers based on relevant features to detect and identify the components of arguments from legal decisions texts as a final goal. The results of the framework experiments are promising, especially this paper is the first in argumentation mining processing at the level of the Arabic texts.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116482927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A new technique for Diffie-hillman key exchange protocol security using random image generation 一种基于随机图像生成的Diffie-hillman密钥交换协议安全新技术
Pub Date : 2019-12-01 DOI: 10.1109/CAS47993.2019.9075670
Rasha M. Mohsin, Rasha I. Ahmed, Rusul Yaqub, Sura Ethar
The rapid development of technology by using the internet as a medium to transfer many types of data has led to the appearance of new problems, such as intrusion, hacking and other problems and providing the security for the progress using these algorithms. The Diffie-hillman algorithm is one of the key exchange protocols that used for the security of information, but by the passing time, the change of security progress led to the occurrence of many problems due to the using Diffie-Hellman protocol in key exchange such as Man-in-the-Middle attack and Discrete logarithm attack. So, to solve these problems and to obtain better security, it needs to generate a random colour image(NxN) for each encryption, then uses an image generated to extract keys by applying the XOR function.
利用互联网作为传输多种类型数据的媒介,技术的迅速发展导致了新的问题的出现,如入侵、黑客攻击等问题,并为使用这些算法的进程提供了安全保障。Diffie-hillman算法是用于信息安全的密钥交换协议之一,但随着时间的推移,安全进程的变化导致在密钥交换中使用Diffie-Hellman协议导致中间人攻击、离散对数攻击等问题的出现。因此,为了解决这些问题并获得更好的安全性,需要为每次加密生成一个随机彩色图像(NxN),然后使用生成的图像通过应用异或函数提取密钥。
{"title":"A new technique for Diffie-hillman key exchange protocol security using random image generation","authors":"Rasha M. Mohsin, Rasha I. Ahmed, Rusul Yaqub, Sura Ethar","doi":"10.1109/CAS47993.2019.9075670","DOIUrl":"https://doi.org/10.1109/CAS47993.2019.9075670","url":null,"abstract":"The rapid development of technology by using the internet as a medium to transfer many types of data has led to the appearance of new problems, such as intrusion, hacking and other problems and providing the security for the progress using these algorithms. The Diffie-hillman algorithm is one of the key exchange protocols that used for the security of information, but by the passing time, the change of security progress led to the occurrence of many problems due to the using Diffie-Hellman protocol in key exchange such as Man-in-the-Middle attack and Discrete logarithm attack. So, to solve these problems and to obtain better security, it needs to generate a random colour image(NxN) for each encryption, then uses an image generated to extract keys by applying the XOR function.","PeriodicalId":202291,"journal":{"name":"2019 First International Conference of Computer and Applied Sciences (CAS)","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133134188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2019 First International Conference of Computer and Applied Sciences (CAS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1