首页 > 最新文献

2017 7th International Conference on Communication Systems and Network Technologies (CSNT)最新文献

英文 中文
Bit level symmetric key cryptography using genetic algorithm 使用遗传算法的位级对称密钥加密
A. Sen, Attri Ghosh, A. Nath
Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.
众所周知,对称密钥加密每次执行加密过程时,都会从相同的纯文本和密钥集产生相同的密文。在这里,作者开发了一种技术,在这种技术中,每次加密纯文本时,都会为同一组纯文本和密钥生成不同的密文。可以使用相同的用户密钥解密生成的不同密码文本。这是通过使用遗传算法完成的。遗传算法用于生成一个中间密钥,该密钥在每次算法执行时都是唯一的。此中间密钥与第一级密文结合生成第二级密文。在后期,使用用户给出的密钥将中间密钥嵌入到第二级密文中,以产生第三级也是最后一级密文。嵌入过程采用了一种全新的算法。所介绍的技术可以用于加密任何类型的机密数据。加密后,原始文件的大小将改变。黑客或入侵者将无法应用标准攻击,如蛮力攻击、已知的明文攻击、差分攻击或统计攻击。在不知道密钥的情况下,将无法解密文本。该方法已在各种已知的纯文本上进行了测试,结果令人满意。
{"title":"Bit level symmetric key cryptography using genetic algorithm","authors":"A. Sen, Attri Ghosh, A. Nath","doi":"10.1109/CSNT.2017.8418536","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418536","url":null,"abstract":"Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R 基于矢量信号收发器5644R的QAM和QPSK无线局域网链路性能研究
G. Soni, C. Verma
A wireless local area network (WLAN) is a digital transmission system designed to provide location independent network access between computing devices by using radio waves in a limited area. Mainly IEEE 802.11 standards are used to provide wireless connectivity at higher speeds. To analyze and check the continuous feasibility of WLAN signal, Vector Signal Transceiver-VST 5644R can be the efficient approach. In this paper the experimental investigation and analysis of WLAN 802.11 standard has been carried out based on vector signal transceiver VST 5644R using different modulation schemes. It was analyzed that QPSK gives best link performance for the WLAN link. The results are being analyzed in terms of EVM (Error vector magnitude). The link has been evaluated at 2.4GHz using QPSK and QAM modulation schemes. This work is based on experimental and real time implementation of WLAN Link based on PXIe 1062Q VST 5644 platform.
无线局域网(WLAN)是一种数字传输系统,旨在通过在有限区域内使用无线电波在计算设备之间提供与位置无关的网络访问。主要使用IEEE 802.11标准来提供更高速度的无线连接。为了分析和验证无线局域网信号连续的可行性,矢量信号收发器- vst5644r是一种有效的方法。本文基于矢量信号收发器VST 5644R,采用不同的调制方案,对WLAN 802.11标准进行了实验研究和分析。分析认为QPSK在WLAN链路中具有最佳的链路性能。结果是根据EVM(误差矢量大小)来分析的。使用QPSK和QAM调制方案对2.4GHz链路进行了评估。本工作是基于PXIe 1062Q VST 5644平台的WLAN链路的实验和实时实现。
{"title":"Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R","authors":"G. Soni, C. Verma","doi":"10.1109/CSNT.2017.8418507","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418507","url":null,"abstract":"A wireless local area network (WLAN) is a digital transmission system designed to provide location independent network access between computing devices by using radio waves in a limited area. Mainly IEEE 802.11 standards are used to provide wireless connectivity at higher speeds. To analyze and check the continuous feasibility of WLAN signal, Vector Signal Transceiver-VST 5644R can be the efficient approach. In this paper the experimental investigation and analysis of WLAN 802.11 standard has been carried out based on vector signal transceiver VST 5644R using different modulation schemes. It was analyzed that QPSK gives best link performance for the WLAN link. The results are being analyzed in terms of EVM (Error vector magnitude). The link has been evaluated at 2.4GHz using QPSK and QAM modulation schemes. This work is based on experimental and real time implementation of WLAN Link based on PXIe 1062Q VST 5644 platform.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Inventory supply & shelfing through data analytics 通过数据分析库存供应和货架
Komal Verma, R. Pandey, Nidhi Srivastava
Experts from different specialized fields trust that another era of Computer Science is emerging. Sometime ago, applications use to run on the individual PC framework's hard drive. With taking a break, the application started to be put away on a nearby server of an organization and from that point the applications were keep running on the individual framework. The following stage to this advancement of software engineering time is moving both the applications and information to the ‘Cloud’, where all information is put away at a virtual server and can be gotten to from anyplace through Internet. Microsoft Azure is a Microsoft's open Cloud Computing Platform. It gives an extensive variety of cloud administrations from Data Storage, Analysis to Computing and Networking of Data. Analysis through Machine learning is one of the administrations that Azure Offers. For dissecting one can use programming languages like R, Python and Visual Studio. R gives a Programming domain broadly utilized for graphically analysis and measurable computing.
来自不同专业领域的专家相信,计算机科学的另一个时代正在出现。以前,应用程序通常运行在个人电脑框架的硬盘上。经过一段时间的休息,应用程序开始放在组织的附近服务器上,从那时起,应用程序继续在单个框架上运行。软件工程时代的下一阶段是将应用程序和信息都转移到“云”上,所有的信息都存放在虚拟服务器上,可以通过互联网从任何地方获取。微软Azure是微软的开放云计算平台。它提供了广泛的各种云管理,从数据存储、分析到计算和数据网络。通过机器学习进行分析是Azure提供的服务之一。为了进行剖析,可以使用R、Python和Visual Studio等编程语言。R提供了一个广泛用于图形分析和可测量计算的编程领域。
{"title":"Inventory supply & shelfing through data analytics","authors":"Komal Verma, R. Pandey, Nidhi Srivastava","doi":"10.1109/csnt.2017.8418566","DOIUrl":"https://doi.org/10.1109/csnt.2017.8418566","url":null,"abstract":"Experts from different specialized fields trust that another era of Computer Science is emerging. Sometime ago, applications use to run on the individual PC framework's hard drive. With taking a break, the application started to be put away on a nearby server of an organization and from that point the applications were keep running on the individual framework. The following stage to this advancement of software engineering time is moving both the applications and information to the ‘Cloud’, where all information is put away at a virtual server and can be gotten to from anyplace through Internet. Microsoft Azure is a Microsoft's open Cloud Computing Platform. It gives an extensive variety of cloud administrations from Data Storage, Analysis to Computing and Networking of Data. Analysis through Machine learning is one of the administrations that Azure Offers. For dissecting one can use programming languages like R, Python and Visual Studio. R gives a Programming domain broadly utilized for graphically analysis and measurable computing.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2017 7th International Conference on Communication Systems and Network Technologies (CSNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1