首页 > 最新文献

IOSR journal of computer engineering最新文献

英文 中文
Secure Payment Solutions Fully Off-Line Functions on Frodo 安全支付解决方案完全离线功能的弗罗多
Pub Date : 2017-05-01 DOI: 10.9790/0661-1902057679
Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran
Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.
网上购物支付方案是近年来流行的一种。在支付过程中,攻击者的目标是通过销售点(PoS)系统窃取客户数据。越来越多的恶意软件可以在设备读取卡片数据时立即窃取数据。因此,在客户和供应商稳定或间歇性断开网络并且在线支付期间没有安全的情况下。我们建议的工作是提供安全的完全脱机的工作是多个客户端服务器之间的交互。这种服务器识别是从合法到非法控制提供给客户密钥的方法。一旦在客户端收集了详细信息,客户帐户就会被可擦除的puf自动禁用。它包括确保有限的活动被称为服务器到客户机的事务是安全的。此外,对FRODO的实用性和安全性进行了详尽的调查,证明了其可行性和合理性。
{"title":"Secure Payment Solutions Fully Off-Line Functions on Frodo","authors":"Z. Ahmad, S. Kusumesh, M.N.M.Shree Charan, M. Narendran","doi":"10.9790/0661-1902057679","DOIUrl":"https://doi.org/10.9790/0661-1902057679","url":null,"abstract":"Online shopping payment scheme is one of the popular in recent years. During payment process the attackers aim to stealing the customer data by targeting the Point of Sale (PoS) system. Increasing malware that can steal card data as soon as they are read by the device. As such, in cases where customer and vendor are steadily or intermittently disconnected from the network and there is no secure during on-line payment. We proposed work is to provide secure fully off-line work is interactivity between multiple client server. This server is identified from legal to illegal control is provided to customer key approach. Once collect the details at customer side are customer account is disable automatically by erasable PUFs . It include that limited activity is ensured referred as server to client transaction is secured. Further, an exhaustive investigation of FRODO utilitarian and security properties is given, demonstrating its viability and plausibility.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73283369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Non Conventional Energy Based Mobile Charger towards Green Computing 一种面向绿色计算的非传统能量移动充电器
Pub Date : 2017-05-01 DOI: 10.9790/0661-1902055865
K. Kumar, S. Saha, Aniket Kumar, S. Sahana
Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.
目前,传统能源被大量开发和利用。在遵守一种预防措施,以提高非常规能源的使用。为了减少传统能源的使用,考虑采用一种双向(或双)混合移动充电器,以实现太阳能和风能作为可再生能源。这款创新的双向混合动力移动充电器可以在白天和晚上使用,当你在旅行时,把它放在车窗或摩托车把手附近。探索能量收集,装置依靠太阳能电池板的能量观测,涡轮机依靠风能和太阳能的可用性从太阳能和风能形成电能。风能和太阳能被认为是产生能量的主要来源,并在其内部有交流充电器输入选项。在充电器和交流输入选项中使用非常规能源产生的能量肯定会带来巨大的突破。该产品的新颖之处在于它的创新,毫不费力的简单性和无可争辩的意图,强调了潜在的社会影响,并导致了绿色计算。
{"title":"A Non Conventional Energy Based Mobile Charger towards Green Computing","authors":"K. Kumar, S. Saha, Aniket Kumar, S. Sahana","doi":"10.9790/0661-1902055865","DOIUrl":"https://doi.org/10.9790/0661-1902055865","url":null,"abstract":"Conventional energy are tapped and used abundantly at present. Keeping in observance a way of precaution is taken to upturn the use of non-conventional energy. Decreasing the use of conventional energy, a two way (or twin) hybrid mobile charger is taken in consideration for implementing both solar energy and wind energy, as the renewable sources of energy. The proposed innovative two way hybrid mobile charger can be used both all through day time and night time, while travelling by possessing the device near the vehicle window panel or motorcycle handle. Energy harvesting is explored, with a device relying on the solar panel energy observation and turbine on formation of electrical energy from solar and wind energy owing to the availability of wind and solar energy. Wind energy and solar energy is considered as the main source for the generation of energy along with AC charger input option within it. The energy generation from the use of nonconventional source of energy in the charger and AC input option will definitely bring a prodigious walkover. The novelty of the product lies in its innovation, effortless simplicity and indisputable intention, accentuating the underlying societal impact and leads towards green computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83399076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System 情感分析系统中Tweets预处理和词干提取的高效算法
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903024450
H. Al-Khafaji, A. Habeeb
The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.
预处理步骤大约消耗了KDD (Knowledge Discovery in Database)总体时间和精力的85%。情感分析作为KDD和数据挖掘的一个新趋势,需要许多预处理步骤,如标记化、停止词删除和词干提取。这些步骤除了发挥准备作用外,还通过排除无用数据和保留重要数据来减少数据。本文设计并实现了一个英语tweets的分词、清理、停词删除和词干提取系统。本系统实现为MS-SQL Server存储过程,作为一个紧密耦合的情感挖掘系统的一部分。使用25万到100万tweets的不同大小的数据集进行了大量实验,证明了系统的有效性和效率,并完成了数据约简过程,在保留重要数据集属性的情况下实现了相当大的规模缩减。随着数据量的增长,系统表现出线性行为。
{"title":"Efficient Algorithms for Preprocessing and Stemming of Tweets in a Sentiment Analysis System","authors":"H. Al-Khafaji, A. Habeeb","doi":"10.9790/0661-1903024450","DOIUrl":"https://doi.org/10.9790/0661-1903024450","url":null,"abstract":"The preprocessing step approximately consumes 85% of the time and efforts of overall time and efforts of the Knowledge Discovery in Database, (KDD). Sentiments analysis, as a new trend in KDD and data mining, requires many preprocessing steps such as tokenization, stop words removing, and stemming. These steps play, in addition to their preparation role, the data reduction role by excluding worthless data and preserving significant data. This paper presents the design and implementation of a system for English tweets segmentation, cleaning, stop words removing, and stemming. This system implemented as MS-SQL Server stored procedures to be part of a tightly coupled sentiments mining system. Many experiments accomplished to prove the validity and efficiency of the system using different sizes data sets arranged from 250000 to 1000000 tweets and it accomplished the data reduction process to achieve considerable size reduction with preservation of significant data set's attributes. The system exhibited linear behavior according to the data size growth.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85359286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption 使用预留房间方法和魔术矩形加密的可逆数据隐藏
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903010105
P. Subashini, Jaspal Singh, Adipta Biswas
In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.
在这个项目中,我们试图使用先进的加密技术来提高数据的安全性。图像加密采用MR (Magic Rectangle)加密技术,文本加密采用RSA算法,LSB作为数据隐藏技术。数据隐藏技术使用LSB替换算法将秘密消息位隐藏到加密图像中。通过选择解密密钥,图像和加密文本都将被提取出来。
{"title":"Reversible Datahiding Using Reserved Room Approach with Magic Rectangle Encryption","authors":"P. Subashini, Jaspal Singh, Adipta Biswas","doi":"10.9790/0661-1903010105","DOIUrl":"https://doi.org/10.9790/0661-1903010105","url":null,"abstract":"In this project, we are trying to promote security to the data using developed encryption techniques. The image is encrypted using Magic Rectangle (MR) encryption technique, and text using the RSA algorithm with LSB as data concealment technique. The data hiding technique uses LSB replacement algorithm for hiding the secret message bits into encrypted image. By choosing the decryption keys, both the image and encrypted text will be extracted.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90071316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of Mechanical fixture for thread detection 螺纹检测机械夹具的设计
Pub Date : 2017-05-01 DOI: 10.9790/3021-0705015053
Fu Bengang, C. Weiming, Shang Wei
{"title":"Design of Mechanical fixture for thread detection","authors":"Fu Bengang, C. Weiming, Shang Wei","doi":"10.9790/3021-0705015053","DOIUrl":"https://doi.org/10.9790/3021-0705015053","url":null,"abstract":"","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90077908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Experimental speech recognition system based on Raspberry Pi 3 基于树莓派3的实验性语音识别系统
Pub Date : 2017-05-01 DOI: 10.9790/0661-190302107112
Hasan Gyulyustan, Svetoslav Enkov
The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.
本文介绍了一种利用树莓派微型计算机和USB网络摄像头的麦克风来检测和记录语音的语音识别系统。该软件包括基于Linux Debian操作系统的不同编程和脚本语言的组合。目前的实验使用的是Raspbian。
{"title":"Experimental speech recognition system based on Raspberry Pi 3","authors":"Hasan Gyulyustan, Svetoslav Enkov","doi":"10.9790/0661-190302107112","DOIUrl":"https://doi.org/10.9790/0661-190302107112","url":null,"abstract":"The paper represents a speech recognition system developed using Raspberry Pi microcomputer and USB webcam’s microphone to detect and record speech. The software includes combination of different programming and scripting languages for Linux Debian based operating systems. Raspbian is used for the current experiment.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78045475","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
The New Approach of AES Key Schedule for Lightweight Block Ciphers 轻量级分组密码AES密钥调度的新方法
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903042126
M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli
This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.
本文研究了分组密码和分组密码的关键组成部分之一密钥调度算法。它从短键中计算相关轮的轮键/子键。实验表明,受高级加密标准AES (Advanced Encryption Standard)密钥调度的启发,提出的密钥调度算法具有雪崩效应和严格雪崩准则(SAC)。它很好地满足了混淆和扩散。所提出的密钥调度算法在SAC测试中的平均成功率为95%。附带结果发现,在检验SAC效应时,位于置信下限和上界之间、大于上界和小于下界的计算值均达到正态分布。此外,基于给出的实例实验结果,所提出的结构表现出很强的雪崩效应,因为几乎在第一轮中,密钥中大约有一半的比特发生了变化。
{"title":"The New Approach of AES Key Schedule for Lightweight Block Ciphers","authors":"M. K. Pehlivanoglu, M. T. Sakalli, N. Duru, Fatma Büyüksaraçoglu Sakalli","doi":"10.9790/0661-1903042126","DOIUrl":"https://doi.org/10.9790/0661-1903042126","url":null,"abstract":"This paper considers block ciphers and key schedule algorithm that is one of the crucial components of a block cipher. It computes round keys/subkeys for relevant round from a short key. The presented experiments show that proposed key schedule algorithm which inspired by Advanced Encryption Standard's (AES) key schedule has desirable properties: Avalanche Effect and Strict Avalanche Criterion (SAC). It satisfies good bit confusion and diffusion. The average success rate of the proposed key schedule algorithm for the SAC test is 95%. As a side result it was found that while testing SAC effect computed values that lie between confidence lower and upper bounds, greater than upper bounds and less than lower bound all of them reach normal distribution. Also based on example given experimental result, proposed structure exhibits a very strong Avalanche Effect because almost at the first round approximately half the bits are changed in the key.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75622100","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing 面向云计算存储安全的数据动态密钥管理与分发技术综述
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903013849
D. Kumar, Jitendra Sheetalani
Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.
数据存储和检索是云环境中的主要问题。对于数据的存储和检索使用了身份验证和授权过程。身份验证和授权过程采用了加密技术。密码学技术提供对称和非对称的密码系统。对称技术是对非对称技术的有效压缩。许多作者使用非对称加密技术的概念来处理云网络上的数据。作者还提出了数据动力学的概念,用于数据检索的证明。检索证明给出了基于云的数据块级审计的概念。数据安全访问面临着数据的加密时间和密钥的生成问题。加密时间和密钥生成时间较长,数据集成容易受到第三方攻击。对于数据的集成,采用了多种算法。本文对云计算数据的密钥生成和加密分析进行了综述。
{"title":"Review of Key Management and Distribution Technique for Data Dynamics for Storage Security in Cloud Computing","authors":"D. Kumar, Jitendra Sheetalani","doi":"10.9790/0661-1903013849","DOIUrl":"https://doi.org/10.9790/0661-1903013849","url":null,"abstract":"Data storage and retrieval is major issue in cloud environments. For data storage and retrieval used authentication and authorization process. The authentication and authorization process used cryptography technique. The cryptography technique provides symmetric and asymmetric crypto systems. The symmetric technique is week in compression of asymmetric technique. Various authors used the concept of asymmetric cryptography technique for the process of data over the cloud network. Authors also suggested the concepts of data dynamics for the proof of data retrieval. The proof of retrieval gives the concept of cloud based data auditing in block level. The access of data security faced a problem of encryption time of data and generation of key. The encryption time and generation of key take more time and invites third party attack on data integration. For the integration of data various algorithms are used. In this paper present the review of key generation and crypto analysis of data over cloud computing.","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80398863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels 基于安全级别的金融机构集成数据仓库体系结构性能研究
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903013437
Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar
The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].
“具有安全级别的金融机构集成数据仓库架构”是针对整个印度金融系统提出的数据仓库架构[1][2][3][4][5]。在SQL Server Management Studio中已经通过观察结果来度量体系结构的性能[5]。本文重点研究了体系结构结果的性能,并证明了所执行的查询具有令人满意的性能。结果的性能在功能上是正确的,因为它的行为符合其规定的功能规范,并根据我们提出的期望获得结果,因为它不会产生危险或代价高昂的故障[6]。它以合理的方式使用,即以典型用户期望的正常方式使用[7]。
{"title":"Performance of Integrated Data Warehouse Architecture for Financial Institutes with Security Levels","authors":"Vaibhav R. Bhedi, Shrinivas P. Deshpande, Ujwal A. Lanjewar","doi":"10.9790/0661-1903013437","DOIUrl":"https://doi.org/10.9790/0661-1903013437","url":null,"abstract":"The “Integrated Data Warehouse Architecture for Financial Institutes with Security Levels” is proposed data warehouse architecuture for overall Indian Finacial System [1][2][3][4][5]. The performance of architecture has been measure in SQL Server Management Studio by observing results[5]. The paper focus on the performance of architecture results and proved the executed queries have been given satisfactory performance. The performance of result is functionally correct because it behaves according to its stated functional specifications and gets the result according to our proposed expectation because it does not produce dangerous or costly failures [6]. It is used in a reasonable manner, that is, in a manner that a typical user expects is normal [7].","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90959371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backward Approach Development for Route Adaptive Mobile Successive Recommendation 路由自适应移动连续推荐的逆向方法开发
Pub Date : 2017-05-01 DOI: 10.9790/0661-1903032932
Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley
The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications
发展是旅行者的预先规划的必要条件。所以他们更多地接触到我们的出租车服务。此外,我们提出了一种新的基于动态规划的方法来解决移动序列推荐问题,该算法名为UniBic,在窄双聚类上,除了BicSPAM之外,在常用的评估场景中优于以往的所有双聚类算法。同时,序列生成过程有效地减少了潜在序列的搜索空间。此外,该方法还可以处理具有最大巡航距离或目的地约束的最优路线搜索问题。在真实数据集和合成数据集上的实验结果表明,该方法的剪枝能力和剪枝效率都超过了目前最先进的方法。因此,我们的技术可以有效地用于解决现实应用中具有许多拾取点的移动顺序推荐问题
{"title":"Backward Approach Development for Route Adaptive Mobile Successive Recommendation","authors":"Mrs. S. Nithya, S. Visakh, J. Gollner, C. Ashley","doi":"10.9790/0661-1903032932","DOIUrl":"https://doi.org/10.9790/0661-1903032932","url":null,"abstract":"The Backward Approach Development is the pre-planning requisite for the traveller’s.So they are more exposed to our taxi service in and out. In addition, accurate query results with up-to-date travel times, price etc.we propose a novel dynamic programming based method to solve the mobile sequential recommendation problem with the new algorithm, named UniBic, outperformed all previous biclustering algorithms in terms of commonly used evaluation scenarios except for BicSPAM on narrow biclusters Simultaneously, the process of sequence generation to reduce the search space of the potential sequences effectively. Moreover, our method can handle the problem of optimal route search with a maximum cruising distance or a destination constraint. Experimental results on real and synthetic data sets show that both the pruning ability and the efficiency of our method surpass the state-of-the-art methods. Our techniques can therefore be effectively employed to address the problem of mobile sequential recommendation with many pickup points in real-world applications","PeriodicalId":91890,"journal":{"name":"IOSR journal of computer engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88765357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IOSR journal of computer engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1