Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran
Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.
{"title":"Secure Payment Solutions Fully Off-Line Functions on Frodo","authors":"Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran","doi":"10.9790/0661-1902057679","DOIUrl":"https://doi.org/10.9790/0661-1902057679","url":null,"abstract":"Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73283369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.
{"title":"A Non Conventional Energy Based Mobile Charger towards Green Computing","authors":"K. Kumar, S. Saha, Aniket Kumar, S. Sahana","doi":"10.9790/0661-1902055865","DOIUrl":"https://doi.org/10.9790/0661-1902055865","url":null,"abstract":"Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83399076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.
预处理步骤大约消耗了KDD (Knowledge Discovery in Database)总体时间和精力的85%。情感分析作为KDD和数据挖掘的一个新趋势,需要许多预处理步骤,如标记化、停止词删除和词干提取。这些步骤除了发挥准备作用外,还通过排除无用数据和保留重要数据来减少数据。本文设计并实现了一个英语tweets的分词、清理、停词删除和词干提取系统。本系统实现为MS-SQL Server存储过程,作为一个紧密耦合的情感挖掘系统的一部分。使用25万到100万tweets的不同大小的数据集进行了大量实验,证明了系统的有效性和效率,并完成了数据约简过程,在保留重要数据集属性的情况下实现了相当大的规模缩减。随着数据量的增长,系统表现出线性行为。
{"title":"Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System","authors":"H. Al-Khafaji, A. Habeeb","doi":"10.9790/0661-1903024450","DOIUrl":"https://doi.org/10.9790/0661-1903024450","url":null,"abstract":"The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85359286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.
{"title":"Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption","authors":"P. Subashini, Jaspal Singh, Adipta Biswas","doi":"10.9790/0661-1903010105","DOIUrl":"https://doi.org/10.9790/0661-1903010105","url":null,"abstract":"In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of Mechanical fixture for thread detection","authors":"Fu Bengang, C. Weiming, Shang Wei","doi":"10.9790/3021-0705015053","DOIUrl":"https://doi.org/10.9790/3021-0705015053","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90077908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-05-01DOI: 10.9790/0661-190302107112
Hasan Gyulyustan, Svetoslav Enkov
The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.
{"title":"Experimental speech recognition system based on Raspberry Pi 3","authors":"Hasan Gyulyustan, Svetoslav Enkov","doi":"10.9790/0661-190302107112","DOIUrl":"https://doi.org/10.9790/0661-190302107112","url":null,"abstract":"The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli
This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.
{"title":"The New Approach of AES Key Schedule for Lightweight Block Ciphers","authors":"M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli","doi":"10.9790/0661-1903042126","DOIUrl":"https://doi.org/10.9790/0661-1903042126","url":null,"abstract":"This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75622100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.
{"title":"Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing","authors":"D. Kumar, Jitendra Sheetalani","doi":"10.9790/0661-1903013849","DOIUrl":"https://doi.org/10.9790/0661-1903013849","url":null,"abstract":"Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80398863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar
The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].
“具有安全级别的金融机构集成数据仓库架构”是针对整个印度金融系统提出的数据仓库架构[1][2][3][4][5]。在SQL Server Management Studio中已经通过观察结果来度量体系结构的性能[5]。本文重点研究了体系结构结果的性能,并证明了所执行的查询具有令人满意的性能。结果的性能在功能上是正确的,因为它的行为符合其规定的功能规范,并根据我们提出的期望获得结果,因为它不会产生危险或代价高昂的故障[6]。它以合理的方式使用,即以典型用户期望的正常方式使用[7]。
{"title":"Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels","authors":"Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar","doi":"10.9790/0661-1903013437","DOIUrl":"https://doi.org/10.9790/0661-1903013437","url":null,"abstract":"The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90959371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications
{"title":"Backward Approach Development for Route Adaptive Mobile Successive Recommendation","authors":"Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley","doi":"10.9790/0661-1903032932","DOIUrl":"https://doi.org/10.9790/0661-1903032932","url":null,"abstract":"The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88765357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}