A New Permutation Based Randomized Neighborhood-Xor Modulo Algorithm S. Arul Jothi Soosai Michael1 and S. Pushparaj Soundarajan2,1Kalasalingam University,India and 2Madurai Kamaraj University,India.
ABSTRACT
Twenty first century is known as an age of information. In this era information is an economic commodity. Information has economic value and production of it incur cost. Securing the information is posing a considerable challenge. The cryptographic technology plays a leading role in securing the owners right on produced information. A continuous development of new encryption systems are necessitated with the advancement in security and efficiency needs. This algorithm undergoes FIPS 140-2 statistical test for randomness. None of the tests are designed to decrypt this encryption algorithm as the use of key scheme is different in it and therefore robust to the conventional cryptanalytic attacks.
Arabic Digit Recognition By Adaptive Network Based Fuzzy Inference System And Subtractive Clustering Samiya Silarbi,Bendahmane Abderrahmane; and Abdelkader Benyettou,University of Sciences and Technology Oran USTO-MB, Algeria.
ABSTRACT
This paper presents the application of Adaptive Network Based Fuzzy Inference System ANFIS on spoken Arabic digit recognition. The primary tasks of fuzzy modeling are structure identification and parameter optimization: the former determines the numbers of membership functions and fuzzy if-then rules while the latter identifies a feasible set of parameters under the given structure. However, the increase of input dimension, rule numbers will have an exponential growth and there will cause problem of "rule disaster". Thus, determination of an appropriate structure becomes an important issue where subtractive clustering is applied to define an optimal initial structure and obtain small number of rules. The appropriate learning algorithm is performed on spoken Arabic digit dataset supervised type, a pre-processing of the acoustic signal and extracting the coefficients MFCCs parameters relevant to the recognition system. Finally, hybrid learning combines the gradient decent and least square estimation LSE of parameters network. The results obtained show the effectiveness of the method in terms of recognition rate and number of fuzzy rules generated.
Hybrid Encryption/Decryption Technique Using New Public Key And Symmetric Key Algorithm Kuppuswamy Prakash,Jazan University,Kingdom of Saudi Arabia.
ABSTRACT
This research study proposes Hybrid Encryption System using new public key algorithm and private key algorithm. A hybrid cryptosystem is one which combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem. Here, we propose a provably two way secured data encryption system, which addresses the concerns of user's privacy, authentication and accuracy. This system has two different encryption algorithms have been used both in the Encryption and decryption sequence. One is public key cryptography based on linear block cipher another one is private key cryptography based on simple symmetric algorithm. This cryptography algorithm provides more security as well as authentication comparing to other existing hybrid algorithm.
Inventive Cubic symmetric encryption system for multimedia Ali Alshahrani,University of Essex,United Kingdom.
ABSTRACT
Cryptography is a security technique that must be applied in both communication sides to protect the data during its transmission through the network from all kinds of attack. On the sender side, the original data will be changed into different symbols or shapes by using a known key; this is called encryption. On the other communication side, the decryption process will be done and the data will be returned to its former shape by using the agreed key. The importance of cryptography is to fulfil the communication security requirements. Real time applications (RTA) are vulnerable for the moment because of their big size. However, some of the current algorithms are not really appropriate for use with these kinds of information. In this paper, a novel symmetric block cipher cryptography algorithm has been illustrated and discussed. The system uses an 8x8x8 cube, and each cell contains a pair of binary inputs. The cube can provide a huge number of combinations that can produce a very strong algorithm and a long key size. Due to the lightweight and fast technique used in this idea, it is expected to be extremely rapid compared to the majority of current algorithms, such as DES and AES.
The effect of social welfare system based on the complex network Dongwei Guo, Shasha Wang, Zhibo Wei, Siwen Wang and Yan Hong,Jinli University,China.
ABSTRACT
With the passage of time, the development of communication technology and transportation broke the
isolation among people. Relationship tends to be complicated, pluralism, dynamism. In the network
where interpersonal relationship and evolved complex net based on game theory work serve respectively
as foundation architecture and theoretical model, with the combination of game theory and regard public
welfare as influencing factor, we artificially initialize that closed network system. Through continual
loop operation of the program , we summarize the changing rule of the cooperative behavior in the
interpersonal relationship, so that we can analyze the policies about welfare system about whole network
and the relationship of frequency of betrayal in cooperative behavior. Most analytical data come from
some simple investigations and some estimates based on internet and environment and the study put
emphasis on simulating social network and analyze influence of social welfare system on Cooperative
Behavio .
On Diagnosis of Longwall Systems Marcin Michalak and Magdalena Lachor,Silesian University of Technology,Poland.
ABSTRACT
Nowadays we can observe the change of the structure of energy resources, which leads to the increasing
fraction of a renewable energy sources. Traditional underground coal mining loses its significance in a
total but there are countries, including Poland, which economy is still coal based. A decreasing coal
resources imply an exploitation a becoming harder accessible coal beds what is connected with the
increase of the safety of the operation. One of the most important technical factor of the safety of
underground coal mining is the diagnostic state o a longwall powered roof support. It consists of dozen
(or hundreds) of units working in a row. The diagnostic state of a powered roof supports depends on the
diagnostic state of all units. This paper describes the possibility of unit diagnostic state analysis based on
the biclustering methods.
What is the Role of the Sensitive Construct Theory in Free and Open Source Software Development? Andre Alessandro Gomes de Souza,London School of Economics and Political Science,United Kingdom.
ABSTRACT
This work provides an insight into John Stacey Adam's Equity Theory, Richard C. Huseman et al.'s Equity Sensitive Construct Theory and suggests three main motivational behaviours for the development of a IPTV platform (Kaltura) based on Free and open Source Softwarebenevolent (the giver), equity sensitive (the neutral) and entitled (the taker). In that, it suggests the Equity Sensitive Construct Theory as the major theoretical concept for individuals' motivation to take part in Free and Open Source Software projects. The Equity Sensitive Construct Theory directly correlates to Adam's Equity Theory and campaigns that a person behave oneself homogeneously, yet individually
in contrasting ways to an apparent equity/inequity - since there are three different classes of individual preferences. This paper suggests that it is well possible to relate psychological models to describe how a group of people or an individual is driven to complete a task: different academics have gathered very good examples that have been verified empirically. However, in the example of the F/OSS movement, this writing considers the motivations of the collaborators as secondary. The primary reason is that the organisations are taking advantage of new technologies to acquire cheap / free labour.
A Web Content Analytics Architecture for Malicious Javascript Detection Jung Jonghun,Korea Internet & Security Agency, Korea.
ABSTRACT
Recent web-based cyber attacks are evolving into a new form of attacks such as private information theft and DDoS attack exploiting JavaScript within a web page. These attacks can be made just by accessing a web site without distribution of malicious codes and infection. Script-based cyber attacks are hard to detect with traditional security equipments such as Firewall and IPS because they inject malicious scripts in a response message for a normal web request. Furthermore, they are hard to trace because attacks such as DDoS can be made just by visiting a web page. Due to these reasons, it is expected that they could result in direct damages and great ripple effects. To cope with these issues, in this article, a proposal is made for techniques that are used to detect malicious scripts through real-time web content analysis and to automatically generate detection signatures for malicious JavaScript.
Svhsievs For Navigation In Virtual Urban Environment Mezati Messaoud1,1University of Ouargla, Algeria,Foudil Cherif2,2University of Biskra, Algeria,Sanza Cedric and Gaildrat Veronique3,3IRIT, Toulouse, France.
ABSTRACT
Many Virtual Reality applications, such as training applications, urban design or gaming are based on a rich
semantic description of the environment. This paper describes our proposal for a representation model of
semantic virtual worlds. Our model called SVHsIEVs1 should provide a consistent representation of the
following aspects: the simulated environment, its structure and the behavior of its elements, and the
knowledge items using ontology, interactions and tasks that virtual humans can perform in the environment.
Our first contribution is to show the influence of adding semantic information (contextual attribute and
relationships between their concepts) to virtual objects and using this influence to define and redefine
interaction with the environment. Our second contribution is to use in our model the Virtual Human based on
two technics: querying and guidelines. Our third contribution is to use these semantic information in
management of tasks for each virtual object; we proposed to define each task by a set of attributes and
relationships, which determines the links between attributes in tasks, and links between other tasks. This
paper presents a multi-agent architecture oriented to Virtual Human in Semantic virtual environments. The
architecture has been successfully tested in 3D dynamic environments with navigation in virtual urban
environment.