keyboard_arrow_up
Top 10 read research articles in the field of Advanced Computing @ 2024

DATA SECURITY THROUGH QR CODE ENCRYPTION AND STEGANOGRAPHY

    M. MaryShanthi Rani1 K.RosemaryEuphrasia2, 1Dept. of Comp. Sci. and Applications, Gandhigram Rural Institute, Deemed University Gandhigram, TamilNadu. India2National University of San Marcos,Peru

    ABSTRACT

    The art of information hiding has become an important issue in the recent years as security of information has become a big concern in this internet era. Cryptography and Steganography play major role for secured data transfer. Steganography stands for concealed writing; it hides the message inside a cover medium. Cryptography conceals the content of a message by encryption. QR (Quick Response) Codes are 2-dimensional bar codes that encode text strings. They are able to encode information in both vertical and horizontal direction, thus able to encode more information. In this paper a novel approach is proposed for secret communication by combining the concepts of Steganography and QR codes. The suggested method includes two phases: (i) Encrypting the message by a QR code encoder and thus creating a QR code (ii) Hiding the QR code inside a colour image. This hiding process embeds the quantised QR code so that it will not make any visible distortion in the cover image and it introduces very minimum Bit Error Rate (BER). Experimental result shows that the proposed method has high imperceptibility, integrity and security.

    KEYWORDS

    Steganography, QR code, BER.


    For More Details :
    https://aircconline.com/acij/V7N2/7216acij01.pdf


    Volume Link :
    http://airccse.org/journal/acij/vol7.html




SECURE CLOUD ARCHITECTURE

    Kashif Munir1 Prof Dr. Sellapan Palaniappan2, 1School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia2School of Science and Engineering, Malaysia University of Science and Technology, Selangor, Malaysia.

    ABSTRACT

    Cloud computing is set of resources and services offered through the Internet. Cloud services are delivered from data centers located throughout the world. Cloud computing facilitates its consumers by providing virtual resources via internet. The biggest challenge in cloud computing is the security and privacy problems caused by its multi-tenancy nature and the outsourcing of infrastructure, sensitive data and critical applications. Enterprises are rapidly adopting cloud services for their businesses, measures need to be developed so that organizations can be assured of security in their businesses and can choose a suitable vendor for their computing needs. Cloud computing depends on the internet as a medium for users to access the required services at any time on pay-per-use pattern. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. In this paper we identify the most vulnerable security threats/attacks in cloud computing, which will enable both end users and vendors to know a bout the k ey security threats associated with cloud computing and propose relevant solution directives to strengthen security in the Cloud environment. We also propose secure cloud architecture for organizations to strengthen the security.

    KEYWORDS

    CloudComputing; Security and Privacy; Threats, Vulnerabilities, SecureCloud Architecture.


    For More Details :
    https://airccse.org/journal/acij/papers/4113acij02.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol4.html




NEO4J, SQLITE AND MYSQL FOR HOSPITAL LOCALIZATION

    Anu Sebastian1Richa Kuriakose2Surekha Mariam Varghese3,Department of Computer Science and Engineering, M.A College of Engineering, Kothamangalam, Kerala, India

    ABSTRACT

    Graphs are efficient ways to visualize and represent real world data. Solutions to many real time scenarios can be easily provided when there is powerful graph databases like neo4j that can be used to efficiently query the graphs with multiple attributes. For instance, querying a system with medical and hospital data can be used to address the problem of location wise medical decision making. Here in this paper we present a neo4j as a solution to medical query

    KEYWORDS

    Graph databases, MySQL, SQLite, cypher query language, Neo4j, Relational databases.


    For More Details :
    https://airccse.org/journal/ijsea/papers/3112ijsea09.pdf


    Volume Link :
    https://www.airccse.org/journal/ijsea/vol3.html




EFFECTIVE WAYS CLOUD COMPUTING CAN CONTRIBUTE TO EDUCATION SUCCESS

    BV Pranay kumar1 Sumitha kommareddy2 N.Uma Rani3,1Department of information technology, CJITS, Jangaon, Warangal.2Department of information technology, CJITS, Jangaon, Warangal.3Department of computer science and engineering ,CJITS, Jangaon, Warangal.

    ABSTRACT

    Cloud computing and education sounds ambiguous on the face of it. Naturally, it’s because, very few individuals, publishers and users alike come from the education sector. In most cases, cloud computing is only associated with businesses and how they can leverage their efficiencies. Just to introduce how the cloud deserves a place in our current education institution, it’s important to reiterate the education philosophy. Its essence is knowledge. It’s this knowledge which brings advancement, achievement and success. However, there are several things which make these parameters unattainable. In blunt language, this is failure. Small classrooms, lack or resources, short- handed staff, lack of adequate teachers…the list is endless. One way or the other, cloud computing can be utilized to improve education standards and activities. The end result will be to curb the above problems and instead, boost performance.

    KEYWORDS

    Cloud Computing, Web service, Virtualization, Grid Computing, Virtual Computing Lab, Higher education institutions, Remote areas.


    For More Details :
    https://airccse.org/journal/acij/papers/4413acij02.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol4.html




FDTD COMPUTATION FOR SAR INDUCED IN HUMAN HEAD DUE TO EXPOSURE TO EMF FROM MOBILE PHONE

    Ashraf A. Aly1Melinda Piket-May21Department of Information Technology, Al Khawarizmi College, UAE2Departement of Electrical and Computer Engineering, University of Colorado at Boulder,USA

    ABSTRACT

    This aim of this paper is to investigate the specific absorption rate (SAR) distribution in a human head by using the finite-difference time-domain (FDTD) calculations, due to exposure to EMF radiation from a mobile phone at frequencies 900 MHz Mobile Phone model with a λ/2 monopole antenna and a hand head phone model dimensions are 100 mm x 50 mm x 20 mm. The head model used is a sphere with a diameter of 18 cm. The FDTD grid size used in the computation was 2.5 mm. The distance between the antenna and head was 5 mm. To simplify the FDTD simulation, the SAR in the head was calculated without the effect of the human body. It was found that the SAR induced in the head decreases with the distance from the radiating source.

    KEYWORDS

    Specific Absorption Rate, Finite-Difference Time-Domain, Mobile Phone


    For More Details :
    https://airccse.org/journal/acij/papers/5614acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol5.html




AN APPROACH FOR BREAST CANCER DIAGNOSIS CLASSIFICATION USING NEURAL NETWORK

    Htet Thazin Tike Thein1Khin Mo Mo Tun2, 1Ph.D Student, University of Computer Studies, Yangon, Myanmar 2Department of Computational Mathematics, University of Computer Studies, Yangon,Myanmar

    ABSTRACT

    Artificial neural network has been widely used in various fields as an intelligent tool in recent years, such as artificial intelligence, pattern recognition, medical diagnosis, machine learning and so on. The classification of breast cancer is a medical application that poses a great challenge for researchers and scientists. Recently, the neural network has become a popular tool in the classification of cancer datasets. Classification is one of the most active research and application areas of neural networks. Major disadvantages of artificial neural network (ANN) classifier are due to its sluggish convergence and always being trapped at the local minima. To overcome this problem, differential evolution algorithm (DE) has been used to determine optimal value or near optimal value for ANN parameters. DE has been applied successfully to improve ANN learning from previous studies. However, there are still some issues on DE approach such as longer training time and lower classification accuracy. To overcome these problems, island based model has been proposed in this system. The aim of our study is to propose an approach for breast cancer distinguishing between different classes of breast cancer. This approach is based on the Wisconsin Diagnostic and Prognostic Breast Cancer and the classification of different types of breast cancer datasets. The proposed system implements the island- based training method to be better accuracy and less training time by using and analysing between two different migration topologies.

    KEYWORDS

    Neural Network, Differential Evolution, Island Model, Classification, Breast Cancer Diagnosis.


    For More Details :
    http://airccse.org/journal/acij/papers/6115acij01.pdf


    Volume Link :
    http://airccse.org/journal/acij/vol7.html




IMPROVING PRIVACY AND SECURITY IN MULTI- TENANT CLOUD ERP SYSTEMS

    Djamal Ziani and Ruba Al-Muwayshir,Department of Information Systems, King Saud University, Riyadh, Saudi Arabia

    ABSTRACT

    This paper discusses cloud ERP security challenges and their existing solutions. Initially, a set of definitions associated with ERP systems, cloud computing, and multi-tenancy, along with their respective challenges and issues regarding security and privacy, are provided. Next, a set of security challenges is listed, discussed, and mapped to the existing solutions to solve these problems. This thesis aims to build an effective approach to the cloud ERP security management model in terms of data storage, data virtualization, data isolation, and access security in cloud ERP. The following proposed techniques are used to improve the security for multi-tenant SaaS: database virtualization, implementation of data encryption and search functionality on databases and developed systems, distribution of data between tenant and ERP providers, secure application deployment in multi-tenant environments, implementation of the authentication and developed systems together as a two-factor authentication, and improved user access control for multi-tenant ERP clouds.

    KEYWORDS

    ERP, ERP system, ERP problems, ERP security challenges, ERP security solutions, ERP and cloud computing.


    For More Details :
    https://aircconline.com/acij/V8N5/8517acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol8.html




EVALUATING THE INTERNAL AND EXTERNAL USABILITY ATTRIBUTES OF E-LEARNING WEBSITES IN SAUDI ARABIA

    Khalid Al-Omar, Department of Information Systems, King Abdulaziz University, Jeddah, Kingdom of Saudi Arabia

    ABSTRACT

    Web usability is important for users who depend on the websites they use, such as online distance education students. Accordingly, universities and educational websites need to determine the types of usability problems that occur on their websites. However, far too little attention has been paid to providing detailed information regarding the types of specific usability problems that occur on elearning websites in general and on those in the Kingdom of Saudi Arabia (KSA) in particular. The aim of this paper was to study and analyse the internal and external usability attributes of university websites that offer distance education courses in Saudi Arabia. Twelve universities in Saudi Arabia were considered—11 governmentaffiliated universities and one private university. The analysis of the data indicates the level of usability of distance education websites. Results reveal that in Saudi Arabia, distance education websites are reliable but violate basic usability guidelines. Furthermore, Saudi elearning websites need to focus on the utility of their home page search engines, provide more advanced search functionality, and provide sitemaps linked to every page on the websites.

    KEYWORDS

    University websites, usability, credibility, e-learning, website design, Saudi Arabia, distance education


    For More Details :
    https://aircconline.com/acij/V8N4/8417acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol8.html




FACE RECOGNITION FROM A SINGLE SAMPLE USING RLOG FILTER AND MANIFOLD ANALYSIS

    Jaya Susan Edith. S1A.Usha Ruby211Department of Computer Science and Engineering,CSI College of Engineering, 2Research scholar, Bharath University

    ABSTRACT

    Face recognition is A technique that has been widely used in various important field, this process helps in the identification of an individual by a machine for the purpose of security and ease of work. The normal technique of face recognition usually works better when there are multiple samples for a single person (MSSP) is available. In present applications where this technique is to be used such as in social networks, security systems, identification cards there is only a single sample per person (SSPP) that is readily available. This less availability of the samples causes failure in the working of conventional face recognition techniques which require multiple samples for a particular individual. To overcome this drawback which sets back the system from the accurate functioning of face recognition this paper puts forward a novel technique which makes use of discriminative multi- manifold analysis (DMMA) that extracts distinctive features using image patches. Recognition is done by the process of manifold to manifold matching. Hence there is an increment in the accuracy rate of face recognition.

    KEYWORDS

    Face recognition; manifold learning; filter; clustering.


    For More Details :
    https://airccse.org/journal/acij/papers/5314acij04.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol5.html




PERFORMANCE ANALYSIS OF VITERBI DECODER FOR WIRELESS APPLICATIONS

    G.Sivasankar and L.Thangarani,Department of Electronics and Communication, Mepco Schlenk Engineering College, Sivakasi, Tamilnadu, India

    ABSTRACT

    Viterbi decoder is employed in wireless communication to decode the convolutional codes; those codes are used in every robust digital communication systems. Convolutional encoding and viterbi decoding is a powerful method for forward error correction. This paper deals with synthesis and implementation of viterbi decoder with a constraint length of three as well as seven and the code rate of ½ in FPGA (Field Programmable Gate Array). The performance of viterbi decoder is analyzed in terms of resource utilization. The design of viterbi decoder is simulated using Verilog HDL. It is synthesized and implemented using Xilinx 9.1ise and Spartan 3E Kit. It is compatible with many common standards such as 3GPP, IEEE 802.16 and LTE.

    KEYWORDS

    Convolutional encoder, Constraint length, Code rate, Viterbi decoder, Viterbi algorithm, Hamming distance, Verilog HDL, FPGA.


    For More Details :
    https://airccse.org/journal/acij/papers/5414acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol5.html




PATH FINDING SOLUTIONS FOR GRID BASED GRAPH

    Dr. R.Anbuselvi M.Sc., M.Phil. Ph.D11Assistant Professor in Computer Science, Bishop Heber College, Trichy-17

    ABSTRACT

    Any path finding will work as long as there are no obstacles on distractions along the way. A genetic Alalgorithm has been used for more advanced environments in graph. Implementation of the path finding algorithm for grid based graph with or without obstacles.

    KEYWORDS

    Path, Finding, Solution.


    For More Details :
    http://airccse.org/journal/acij/papers/4213acij05.pdf


    Volume Link :
    http://airccse.org/journal/acij/vol7.html




DETECTION OF FORGERY AND FABRICATION IN PASSPORTS ANDVISAS USING CRYPTOGRAPHY AND QR CODES

    Cheman Shaik, VISH Consulting Services Inc, 6242 N Hoyne Avenue, Chicago IL 60659, USA

    ABSTRACT

    In this paper, we present a novel solution to detect forgery and fabrication in passports and visas using cryptography and QR codes. The solution requires that the passport and visa issuing authorities obtain a cryptographic key pair and publish their public key on their website. Further they are required to encrypt the passport or visa information with their private key, encode the ciphertext in a QR code and print it on the passport or visa they issue to the applicant. The issuing authorities are also required to create a mobile or desktop QR code scanning app andplace it for download on their website or Google Play Store and iPhone App Store. Anyindividual or immigration authority that needs to check the passport or visa for forgery and fabrication can scan its QR code, which will decrypt the ciphertext encoded in the QR code usingthe public key stored in the app memory and displays the passport or visa information on the app screen. The details on the app screen can be compared with the actual details printed on the passport or visa. Any mismatch between the two is a clear indication of forgery or fabrication.

    KEYWORDS

    Passport, Visa, Forgery, Fabrication, Cryptography, Encryption, Decryption, QR Code, Mobile App.


    For More Details :
    https://aircconline.com/acij/V12N1/12121acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol12.html




BINARY SINE COSINE ALGORITHMS FOR FEATURE SELECTION FROM MEDICAL DATA

    Shokooh TaghianA1,2Mohammad H. Nadimi-Shahraki1,21Faculty of Computer Engineering, Najafabad Branch, Islamic Azad University, Najafabad, Iran2Research Center, Najafabad Branch, Islamic Azad University, Najafabad, Iran

    ABSTRACT

    A well-constructed classification model highly depends on input feature subsets from a dataset, which may contain redundant, irrelevant, or noisy features. This challenge can be worse while dealing with medical datasets. The main aim of feature selection as a pre-processing task is to eliminate these features and select the most effective ones. In the literature, metaheuristic algorithms show a successful performance to find optimal feature subsets. In this paper, two binary metaheuristic algorithms named Sshaped binary Sine Cosine Algorithm (SBSCA) and V-shaped binary Sine Cosine Algorithm (VBSCA) are proposed for feature selection from the medical data. In these algorithms, the search space remains continuous, while a binary position vector is generated by two transfer functions S-shaped and V-shaped for each solution. The proposed algorithms are compared with four latest binary optimization algorithms over five medical datasets from the UCI repository. The experimental results confirm that using bothbSCA variants enhance the accuracy of classification on these medical datasets compared to fourother algorithms.

    KEYWORDS

    Medical data, Feature selection, metaheuristic algorithm, Sine Cosine Algorithm, Transfer function.


    For More Details :
    https://aircconline.com/acij/V10N5/10519acij01.pdf


    Volume Link :
    https://airccse.org/journal/acij/vol10.html








menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close