首页 > 最新文献

Int. J. Secur. Priv. Pervasive Comput.最新文献

英文 中文
A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework 虚拟世界的描述性研究:网络安全风险、控制与监管框架
Pub Date : 2023-01-01 DOI: 10.4018/ijsppc.315591
Glorin Sebastian
Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.
极致主义,直接从科幻小说中获得的相互关联的体验,基于个人电脑和增强现实耳机的3D虚拟环境——一个被称为“虚拟世界”的世界——这是科技巨头正在投资的未来互联网愿景。关于元环境中的数据隐私风险已经有了一些研究;然而,对于像metaverse这样的虚拟现实平台的网络安全风险,并没有进行详细的研究。这篇研究论文解决了这一理解上的差距,即在元宇宙平台上可能存在的各种网络安全风险。本研究试图通过描述支持元宇宙平台的技术,并了解每种技术中固有的网络安全威胁,来了解与元宇宙相关的风险。此外,本文还提出了网络安全风险治理监管框架来缓解这些风险。
{"title":"A Descriptive Study on Metaverse: Cybersecurity Risks, Controls, and Regulatory Framework","authors":"Glorin Sebastian","doi":"10.4018/ijsppc.315591","DOIUrl":"https://doi.org/10.4018/ijsppc.315591","url":null,"abstract":"Maximalist, interconnected set of experiences straight out of sci-fi, based on 3D virtual environment through personal computing, and augmented reality headsets—a world known as the Metaverse—this is the futuristic vision of internet that technology giants are investing in. There has been some research on data privacy risks in the metaverse; however, detailed research on the cybersecurity risks of virtual reality platforms like metaverse have not been performed. This research paper addresses this gap of understanding the various possible cybersecurity risks on metaverse platforms. This study tries to understand the risks associated with metaverse by describing the technologies supporting metaverse platform and understanding the inherent cybersecurity threats in each of these technologies. Further, the paper proposes a cybersecurity risk governance regulatory framework to mitigate these risks.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130659312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Heart Disease Prediction Model Using Varied Classifiers with Score-Level Fusion 基于评分水平融合的不同分类器的心脏病预测模型
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.313587
Mohammad Haider Syed
This paper aims to introduce a novel heart disease prediction model. Originally, the input data is subjected for preprocessing, in which the data cleaning takes place. The features like statistical, higher order statistical features, and symmetrical uncertainty are extracted from the preprocessed data. Then, the selected features are subjected to the classification process with an ensemble model that combines the classifiers like deep belief network (DBN), random forest (RF), and neural network (NN). At last, the score level fusion is carried out to provide the final output. To make the classification more precise and accurate, it is intended to tune the weights of DBN more optimally. A new self-adaptive honey bee mating optimization (SAHBMO) algorithm is implemented in this work for this optimal tuning. Finally, the performance of the presented scheme is computed over the existing approaches in terms of different metrics.
本文旨在介绍一种新的心脏病预测模型。最初,输入数据要进行预处理,在此过程中进行数据清理。从预处理后的数据中提取统计特征、高阶统计特征和对称不确定性等特征。然后,使用结合深度信念网络(DBN)、随机森林(RF)和神经网络(NN)等分类器的集成模型对选中的特征进行分类。最后进行评分等级融合,提供最终输出。为了使分类更加精确和准确,我们打算更优化地调整DBN的权重。本文实现了一种新的自适应蜜蜂交配优化算法(SAHBMO)。最后,根据不同的度量对现有方法的性能进行了计算。
{"title":"Heart Disease Prediction Model Using Varied Classifiers with Score-Level Fusion","authors":"Mohammad Haider Syed","doi":"10.4018/ijsppc.313587","DOIUrl":"https://doi.org/10.4018/ijsppc.313587","url":null,"abstract":"This paper aims to introduce a novel heart disease prediction model. Originally, the input data is subjected for preprocessing, in which the data cleaning takes place. The features like statistical, higher order statistical features, and symmetrical uncertainty are extracted from the preprocessed data. Then, the selected features are subjected to the classification process with an ensemble model that combines the classifiers like deep belief network (DBN), random forest (RF), and neural network (NN). At last, the score level fusion is carried out to provide the final output. To make the classification more precise and accurate, it is intended to tune the weights of DBN more optimally. A new self-adaptive honey bee mating optimization (SAHBMO) algorithm is implemented in this work for this optimal tuning. Finally, the performance of the presented scheme is computed over the existing approaches in terms of different metrics.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124162308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trends in Remote User Authentication Based on Smart Card and External Memory 基于智能卡和外置存储器的远程用户认证研究进展
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.307148
Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. Kana
This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.
本研究对基于智能卡和外存储器的远程用户认证研究进行了文献综述。基于智能卡的方案的主要安全保证是耐高温性。其他原因还包括物理尺寸小、便携性、非易失性存储器的便利性以及嵌入塑料卡的单芯片计算机提供的安全性。最有效的方案是使用哈希函数或ECC的方案。卡和读卡器及其部署的高成本仍然是发卡机构或用户的负担。这就是使用外置存储器而不是智能卡的动机。但与外存储器相关的非回火性能问题限制了该方向的研究。此外,在所有审查的研究中,还缺乏其他必要的用户认证活动,如忘记/重置密码和重新注册,以防外部存储器或智能卡被盗或丢失。
{"title":"Trends in Remote User Authentication Based on Smart Card and External Memory","authors":"Bello Alhaji Buhari, A. Obiniyi, S. Junaidu, A. Kana","doi":"10.4018/ijsppc.307148","DOIUrl":"https://doi.org/10.4018/ijsppc.307148","url":null,"abstract":"This research performs a literature survey of remote user authentication researches based on smart card and external memory. The main security confidence of smart card based schemes is temper-resistance property. Other reasons are small physical size, portability, convenience of non-volatile memory, and security provided by a single chip computer embedded in a plastic card. The most efficient schemes are those that used hash function or ECC. The high cost of the cards and readers and their deployment remains a burden to issuers or users. This is what motivates the use of external memory instead of smart card. But the problem of non-temper resistance property associated with external memory limited researches in that direction. There are also, absence of other activities that are essential in user authentication such as forgot/reset password and re-registration in case the external memory or smart card is stolen or lost in all the reviewed researches.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115896761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With ANN 基于反向传播算法的字母数字模式识别设计与实现
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.295086
Alankrita Aggarwal, Shivani Gaba, Shally Chawla, Anoopa Arya
The artificial neural network has been called for its application as alphanumeric characters recognizing the network. The idea is to maintain the obsolete data available in hard copy form and to convert that data into digital form. Some specific bit patterns that correspond to the character are trained using the network. The numbers of input and output layer neurons are chosen. As there are many ways to do but in this the algorithm used for training the network is called the Backpropagation Algorithm using the delta rule. The testing and training patterns are provided for which weights are calculated in the program and patterns are recognized and analysis is done. The effect of variations in the hidden layers is also observed with pattern matrices.
人工神经网络作为字母数字字符识别网络已得到广泛的应用。这个想法是保持过时的数据以硬拷贝形式提供,并将这些数据转换为数字形式。使用该网络训练与字符对应的一些特定位模式。选择输入和输出层神经元的数量。因为有很多方法可以做到,但在这个算法中,用于训练网络的算法被称为使用增量规则的反向传播算法。提供测试和训练模式,在程序中计算权重,识别模式并进行分析。在模式矩阵中也观察到隐藏层变化的影响。
{"title":"Recognition of Alphanumeric Patterns Using Backpropagation Algorithm for Design and Implementation With ANN","authors":"Alankrita Aggarwal, Shivani Gaba, Shally Chawla, Anoopa Arya","doi":"10.4018/ijsppc.295086","DOIUrl":"https://doi.org/10.4018/ijsppc.295086","url":null,"abstract":"The artificial neural network has been called for its application as alphanumeric characters recognizing the network. The idea is to maintain the obsolete data available in hard copy form and to convert that data into digital form. Some specific bit patterns that correspond to the character are trained using the network. The numbers of input and output layer neurons are chosen. As there are many ways to do but in this the algorithm used for training the network is called the Backpropagation Algorithm using the delta rule. The testing and training patterns are provided for which weights are calculated in the program and patterns are recognized and analysis is done. The effect of variations in the hidden layers is also observed with pattern matrices.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129068820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Home Automation and Application With Bolt IoT Bolt IoT的家庭自动化和应用
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.313047
Ashish Sudhir Kakne, P. Chouragade
Even with advancement of communications technologies, home automation and application have received major attention. Today's digital world is mostly reliant on the internet so that there is a need to design such a solution to make more efficient from unauthorized components to safeguard the data that may work in wireless mode alone. This system provides guidance towards operational operations specifically surveillance on the areas and its structure and managing assets over the internet utilizing web applications employing IoT techniques. Home automation is a vital unit which must meet the main criteria like user interface and safety. In the current situation, the complete process depends on the Bolt IoT platform, a home automation system where it can access and manage house devices remotely from anywhere. The user may use this system to operate different equipment like LEDs, fans, or DC motors as well as to keep an eye on the environment's temperature. In addition, the Bolt IoT module enables cloud connectivity to the system, and sensor data is communicated to the cloud.
即使随着通信技术的进步,家庭自动化和应用也受到了广泛的关注。当今的数字世界主要依赖于互联网,因此有必要设计这样一种解决方案,使未经授权的组件更有效,以保护可能仅在无线模式下工作的数据。该系统为操作操作提供指导,特别是对区域及其结构进行监视,并利用采用物联网技术的web应用程序通过互联网管理资产。家庭自动化是一个至关重要的单元,它必须满足用户界面和安全等主要标准。在目前的情况下,整个过程取决于Bolt物联网平台,这是一个家庭自动化系统,可以从任何地方远程访问和管理家庭设备。用户可以使用这个系统来操作不同的设备,如led、风扇或直流电机,以及关注环境的温度。此外,Bolt物联网模块可实现与系统的云连接,并将传感器数据传输到云端。
{"title":"Home Automation and Application With Bolt IoT","authors":"Ashish Sudhir Kakne, P. Chouragade","doi":"10.4018/ijsppc.313047","DOIUrl":"https://doi.org/10.4018/ijsppc.313047","url":null,"abstract":"Even with advancement of communications technologies, home automation and application have received major attention. Today's digital world is mostly reliant on the internet so that there is a need to design such a solution to make more efficient from unauthorized components to safeguard the data that may work in wireless mode alone. This system provides guidance towards operational operations specifically surveillance on the areas and its structure and managing assets over the internet utilizing web applications employing IoT techniques. Home automation is a vital unit which must meet the main criteria like user interface and safety. In the current situation, the complete process depends on the Bolt IoT platform, a home automation system where it can access and manage house devices remotely from anywhere. The user may use this system to operate different equipment like LEDs, fans, or DC motors as well as to keep an eye on the environment's temperature. In addition, the Bolt IoT module enables cloud connectivity to the system, and sensor data is communicated to the cloud.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133278450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A DSPL and Reinforcement Learning Approach for Context-Aware IoT Systems Development 上下文感知物联网系统开发的DSPL和强化学习方法
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.310084
Amal Hallou, Tarik Fissaa, H. Hafiddi, M. Nassar
The internet of things is a paradigm of interconnected devices able to communicate and exchange information to achieve users' requirements. In spite of their expansion in the last years, IoT systems still face challenges that hinder gaining major advantages from them. One of these challenges is to automatically adapt the system to the user's context and preferences. As a proposition to deal with this problem, this paper presents a methodology to design and develop IoT systems that adapt their behavior to their context, which can be a user or environmental context. This methodology is based on dynamic software product line engineering and uses Markov process to design the adaptation plan of the system and a reinforcement learning algorithm to implement it.
物联网是一种互联设备的范式,这些设备能够进行通信和交换信息,以实现用户的需求。尽管物联网系统在过去几年中得到了扩展,但它们仍然面临着阻碍从中获得主要优势的挑战。其中一个挑战是自动使系统适应用户的上下文和偏好。为了解决这个问题,本文提出了一种方法来设计和开发物联网系统,使其行为适应其上下文,可以是用户或环境上下文。该方法基于动态软件产品线工程,采用马尔可夫过程设计系统的自适应方案,并采用强化学习算法实现。
{"title":"A DSPL and Reinforcement Learning Approach for Context-Aware IoT Systems Development","authors":"Amal Hallou, Tarik Fissaa, H. Hafiddi, M. Nassar","doi":"10.4018/ijsppc.310084","DOIUrl":"https://doi.org/10.4018/ijsppc.310084","url":null,"abstract":"The internet of things is a paradigm of interconnected devices able to communicate and exchange information to achieve users' requirements. In spite of their expansion in the last years, IoT systems still face challenges that hinder gaining major advantages from them. One of these challenges is to automatically adapt the system to the user's context and preferences. As a proposition to deal with this problem, this paper presents a methodology to design and develop IoT systems that adapt their behavior to their context, which can be a user or environmental context. This methodology is based on dynamic software product line engineering and uses Markov process to design the adaptation plan of the system and a reinforcement learning algorithm to implement it.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127813595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA-Based LSB Steganography 基于dna的LSB隐写术
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.302010
Abdelkader Khobzaoui, Boualem Mansouri, Kadda Benyahia
The integrity and confidentiality of transmitted data are the main requirements of any data security system. To achieve these goals, many techniques have been developed, including cryptography and steganography. Recently, DNA-based steganography has emerged as a very powerful and promising approach to ensure the safety of sensitive information transmitted over an untrusted channel. In this paper, a two-level encryption/decryption scheme combining cryptography and steganography is proposed. First, the plain-text is concealed in a cover image by scattering its letters over randomly selected pixels. Then, the modified image is encrypted by encoding its pixels in a DNA sequence using a symmetric key. Simulations have shown that the proposed scheme is more robust than any other system based on standalone techniques and requires less computing resources.
传输数据的完整性和保密性是任何数据安全系统的主要要求。为了实现这些目标,已经开发了许多技术,包括密码学和隐写术。最近,基于dna的隐写术已经成为一种非常强大和有前途的方法,以确保在不可信的信道上传输敏感信息的安全性。本文提出了一种结合密码学和隐写术的两级加解密方案。首先,通过将纯文本的字母分散在随机选择的像素上,将其隐藏在封面图像中。然后,通过使用对称密钥在DNA序列中编码其像素,对修改后的图像进行加密。仿真结果表明,该方案比其他基于独立技术的系统具有更强的鲁棒性,并且所需的计算资源更少。
{"title":"DNA-Based LSB Steganography","authors":"Abdelkader Khobzaoui, Boualem Mansouri, Kadda Benyahia","doi":"10.4018/ijsppc.302010","DOIUrl":"https://doi.org/10.4018/ijsppc.302010","url":null,"abstract":"The integrity and confidentiality of transmitted data are the main requirements of any data security system. To achieve these goals, many techniques have been developed, including cryptography and steganography. Recently, DNA-based steganography has emerged as a very powerful and promising approach to ensure the safety of sensitive information transmitted over an untrusted channel. In this paper, a two-level encryption/decryption scheme combining cryptography and steganography is proposed. First, the plain-text is concealed in a cover image by scattering its letters over randomly selected pixels. Then, the modified image is encrypted by encoding its pixels in a DNA sequence using a symmetric key. Simulations have shown that the proposed scheme is more robust than any other system based on standalone techniques and requires less computing resources.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129504345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Interpretation on the Google Cloud Platform and Its Wide Cloud Services 解读谷歌云平台及其广泛的云服务
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.313586
Rafat Ul Aman Sajid, Siraj-ul-Islam, A. K. M. Rakib, Amandeep Kaur
Cloud computing is growing wide and first-rate promising technology. There are three forms of cloud computing: infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). There are many cloud service providers. Among these, AWS (Amazon Web Service), Azure (Microsoft Cloud), IBM Cloud, Oracle Cloud, and VMware are immensely popular. In this paper, the authors study the Google Cloud Platform (GCP) and a few principally used popular services. Google Cloud Platform could be a cloud provider; they supply servers and services that are used on-demand and at scale. Google Cloud Platform is the fastest growing cloud service supplier now.
云计算是一种发展广泛且极具前景的技术。云计算有三种形式:基础设施即服务(IaaS)、软件即服务(SaaS)和平台即服务(PaaS)。有许多云服务提供商。其中,AWS(亚马逊网络服务)、Azure(微软云)、IBM云、Oracle云和VMware非常受欢迎。在本文中,作者研究了谷歌云平台(GCP)和一些主要使用的流行服务。谷歌云平台可以成为云提供商;它们提供按需大规模使用的服务器和服务。谷歌云平台是目前增长最快的云服务供应商。
{"title":"Interpretation on the Google Cloud Platform and Its Wide Cloud Services","authors":"Rafat Ul Aman Sajid, Siraj-ul-Islam, A. K. M. Rakib, Amandeep Kaur","doi":"10.4018/ijsppc.313586","DOIUrl":"https://doi.org/10.4018/ijsppc.313586","url":null,"abstract":"Cloud computing is growing wide and first-rate promising technology. There are three forms of cloud computing: infrastructure as a service (IaaS), software as a service (SaaS), and platform as a service (PaaS). There are many cloud service providers. Among these, AWS (Amazon Web Service), Azure (Microsoft Cloud), IBM Cloud, Oracle Cloud, and VMware are immensely popular. In this paper, the authors study the Google Cloud Platform (GCP) and a few principally used popular services. Google Cloud Platform could be a cloud provider; they supply servers and services that are used on-demand and at scale. Google Cloud Platform is the fastest growing cloud service supplier now.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134440548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Analysis of a Multiple-Shift Computer-Based Examination Evaluation System 多班制计算机考试评价系统分析
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.307112
Hemlata A.
Conducting the exam in different shifts means the variation in the difficulty level of the different shifts of the exam. Various recruitment bodies adopt normalization process to solve this issue. This paper contains a detailed study of the normalization process carried out by the recruitment bodies. The study also includes the effect of normalization in the candidate's score and it depends on the difficulty level of the shift in which the candidate appears in the exam. This work can be further enhanced by comparing the different methods adopted by similar recruitment/selection organization and adopting the best, more appropriate approach to improve the system. This analysis will help in improving the evaluation system and make the system more robust and accurate. So that a more accurate merit list can be prepared and all the stakeholders can be reassured. It is very important to make the system transparent, so that the stakeholders have a clear understanding of the system and at the same time they should be aware of the advantages and disadvantages of the system.
考试分班进行意味着考试分班难度的不同。各招聘机构采用规范化流程解决这一问题。本文详细研究了征聘机构进行的规范化进程。该研究还包括标准化对考生分数的影响,这取决于考生在考试中出现的转变的难度水平。通过比较同类招聘/甄选机构采用的不同方法,并采用最佳、更合适的方法来改进系统,可以进一步加强这项工作。这一分析有助于改进评价体系,使评价体系更加稳健和准确。这样才能编制出更准确的绩效清单,让所有利益相关者都放心。使制度透明是非常重要的,这样利益相关者对制度有一个清晰的认识,同时他们也应该意识到制度的利弊。
{"title":"Analysis of a Multiple-Shift Computer-Based Examination Evaluation System","authors":"Hemlata A.","doi":"10.4018/ijsppc.307112","DOIUrl":"https://doi.org/10.4018/ijsppc.307112","url":null,"abstract":"Conducting the exam in different shifts means the variation in the difficulty level of the different shifts of the exam. Various recruitment bodies adopt normalization process to solve this issue. This paper contains a detailed study of the normalization process carried out by the recruitment bodies. The study also includes the effect of normalization in the candidate's score and it depends on the difficulty level of the shift in which the candidate appears in the exam. This work can be further enhanced by comparing the different methods adopted by similar recruitment/selection organization and adopting the best, more appropriate approach to improve the system. This analysis will help in improving the evaluation system and make the system more robust and accurate. So that a more accurate merit list can be prepared and all the stakeholders can be reassured. It is very important to make the system transparent, so that the stakeholders have a clear understanding of the system and at the same time they should be aware of the advantages and disadvantages of the system.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116071859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DNA-Based E-Voting System 基于dna的电子投票系统
Pub Date : 2022-01-01 DOI: 10.4018/ijsppc.302008
Hadj Gharib, Abdelkader Khobzaoui
Electronic voting, often referred to as "e-voting," has gained popularity in recent years because it reduces the cost and time of counting, increases voter participation, and reduces human resources, thereby reducing fraud and increasing transparency. In this paper, an e-voting system is designed and implemented using symmetric DNA encryption. The proposed scheme consists of using DNA-XOR as secret sharing operator for multi-authority secret ballot elections which enables end-to-end vote verification. The transmitted data is divided into segments and converted into DNA sequences. The main contributions of the resulting system are our proposal for secret sharing between authorities via DNA cryptosystem which ensures that no single authority can compromise the integrity of the ballot without the approval of the other authorities and the proposal's computational and architectural scalability, which makes it simple to implement.
电子投票,通常被称为“电子投票”,近年来越来越受欢迎,因为它减少了计票的成本和时间,增加了选民的参与,减少了人力资源,从而减少了欺诈和提高了透明度。本文设计并实现了一个采用对称DNA加密的电子投票系统。该方案采用DNA-XOR作为秘密共享算子进行多权威无记名投票选举,实现端到端投票验证。传输的数据被分成片段并转换成DNA序列。由此产生的系统的主要贡献是我们通过DNA密码系统在权威机构之间进行秘密共享的建议,该建议确保没有任何一个权威机构可以在没有其他权威机构批准的情况下损害选票的完整性,以及该建议的计算和架构可扩展性,这使得它易于实现。
{"title":"DNA-Based E-Voting System","authors":"Hadj Gharib, Abdelkader Khobzaoui","doi":"10.4018/ijsppc.302008","DOIUrl":"https://doi.org/10.4018/ijsppc.302008","url":null,"abstract":"Electronic voting, often referred to as \"e-voting,\" has gained popularity in recent years because it reduces the cost and time of counting, increases voter participation, and reduces human resources, thereby reducing fraud and increasing transparency. In this paper, an e-voting system is designed and implemented using symmetric DNA encryption. The proposed scheme consists of using DNA-XOR as secret sharing operator for multi-authority secret ballot elections which enables end-to-end vote verification. The transmitted data is divided into segments and converted into DNA sequences. The main contributions of the resulting system are our proposal for secret sharing between authorities via DNA cryptosystem which ensures that no single authority can compromise the integrity of the ballot without the approval of the other authorities and the proposal's computational and architectural scalability, which makes it simple to implement.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116750100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Secur. Priv. Pervasive Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1