Journal Vol – 14 No -3, June 2019

Enhanced Cyber security for Software Applications

Authors:

Sivaram Rajeyyagari

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00031

Abstract:

Every website developed with web technologies. Security is most widely needed for every website. Cyber security is one of the important prevention for websites. This will protect web applications from various attacks. Many attacks are there such as server attacks, DOS attack, data attack and other types of attacks. This will damage the server and social networking sites to disturb the user data. Various drawbacks are addressed in providing security and privacy. To solve these issues, enhanced cyber security is introduced and provided advanced cyber security for web applications and also for servers. The performance of the proposed system is show in results

Keywords:

Cyber security,cyber crime,cyber ethics,social media,

Refference:

I.A. Avancini, M. Ceccato, “Towards Security Testing with Taint Analysis and Genetic Algorithms”, ICSE Workshop on Software Engineering for Secure Systems, vol. 5, pp.65-71, 2010.
II.L. K. Shar, H. B. K. Tan, “Automated removal of cross site scripting vulnerabilities in web applications”, Inf. Softw. Technol., vol. 54, pp. 467-478, 2012.
III.L. S. Shar, H. B. K. Tan, L. C. Briand, “Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis”, Proc. of Int. Conf. on Software Engineering (ICSE ’13), pp. 642-651, 2013.
IV.Marashdih Abdalla Wasef, “ZaabaZarulFitri Cross Site Scripting Detection Approaches in Web Application”, International Journal of Advanced Computer Science and Applications., vol. 7, no. 10, pp. 155-160, 2016.
V.Meijunjin, “An Approach For Sql Injection Vulnerability Detection”, 2009 Sixth International Conference On Information Technology: New Generations IEEE, pp.1411-1414.
VI.R. Kumar, “Mitigating the authentication vulnerabilities in Web applications through security requirements”, Information and Communication Technologies (WICT), vol. 60,pp. 651-663, 2011.
VII.S. Ali, S.K. Shahzad, H. Javed, “SQLIPA: An Authentication Mechanism Against SQL Injection”, European Journal of Scientific Research, vol. 38, no. 4, pp. 604-611, 2009.
VIII.S. J. Sadana, N. Selam, “Analysis of Cross Site Scripting Attack”, Proc. International Journal of Engineering Research and Applications (IJERA), vol. 1, no. 4, pp. 1764-1773, 2011.
IX.Tajpour Atefeh, Maslin Masrom, Mohammad Zaman Heydari, Suhaimi Ibrahim, “SQL injection detection and prevention tools assessment”, Computer Science and Information Technology (ICCSIT) 2010 3rd IEEE International Conference, vol. 9, pp. 518-522, 2010.
X.Yang Haixia, Nan Zhihong, “A Database Security Testing Scheme Of Web Application”, 4th International Conference On Computer Science And Education, pp. 953-955, 2009.
XI.Y. Li, Z. Wang, T. Guo, “Reflected XSS Vulnerability Analysis”, International Research Journal of Computer Science and Information Systems (IRJCSIS), vol. 2, pp.25-33, 2013.
XII.YongJoonPark, JaeChul Park, “Web Application Intrusion Detection System For Input Validation Attack”, Third 2008 International Conference On Convergence And Hybrid Information Technology IEEE, pp. 498-504.
View Download

The Stable Envelope of Gamma Modules

Authors:

Mehdi S.Abbas, Balsam M.Hamad

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00032

Abstract:

Presume R represents commutative -ring with identity and each R modules is worked on as unitary R modules. We expand in this paper the notion of the stable extension from the modules theory to that of gamma modules. We have studied the stable envelope S(M) of R - module M, and study the relation istween stable envelope, injective envelope E(M) and quasi-injective envelope Q(M) in the gamma modules, we obtain some results on S(M) where we have shown that S(M) is equal to 􀵣𝑎𝑛𝑛􀯋􀳨𝐸(𝑀):􀯋 𝑎𝑛𝑛􀯋􀳨 (𝑁)􀵧M , in case M represents Г − multiplication gamma modules.

Keywords:

injective gamma module,quasi-injective gamma module,fully stable gamma module,Г−multiplication Г−moduleI.Abbas.M. S, On fully stable module, Ph. D. thesis, University of Baghdad (1990). II. Balsam m. Hamad, Some remarks on fully stable gamma modules, to appear . III.Abbas .M. S,Saad .S. A, Shallal .E. A, Injective gamma module, Annals of pure and applied mathematics, vol.12, No.185-94, (2016). IV.Ameri .R, and R. Sudeghi, Gamma modules, Ration mathematica 20 (2010), 127-147. V.Abd Al-Hussain. H, Projective gamma modules and some related notions, Ph.D. Thesis ,Univ. of Mustansiriyah, (2017). VI.Barnes .W. E, On the ring of Nabusuwa, Pacin the case ofic J. math. 18 (1966)m 411-422. VII.Estaji.A. A, A. As. Estaji, A. S. Khorasani, S. Baghdari, On multiplication Γ – modules, Ratio mathematica 26 (2014), 21-38. VIII.X. Ma and J.zhan , Some characterizations of regular and semisimple -rings, kyungpook Math.j.,50(2010),pp.411-417. IX.Nobusuwa .N, on a generalization of the ring theory, Osaka J. Math, 1 (1964), 81-89. ,

Refference:

I.Abbas.M. S, On fully stable module, Ph. D. thesis, University of Baghdad (1990).

II. Balsam m. Hamad, Some remarks on fully stable gamma modules, to appear .

III.Abbas .M. S,Saad .S. A, Shallal .E. A, Injective gamma module, Annals of pure and applied mathematics, vol.12, No.185-94, (2016).

IV.Ameri .R, and R. Sudeghi, Gamma modules, Ration mathematica 20 (2010), 127-147.

V.Abd Al-Hussain. H, Projective gamma modules and some related notions, Ph.D. Thesis ,Univ. of Mustansiriyah, (2017). VI.Barnes .W. E, On the ring of Nabusuwa, Pacin the case ofic J. math. 18 (1966)m 411-422.

VII.Estaji.A. A, A. As. Estaji, A. S. Khorasani, S. Baghdari, On multiplication Γ – modules, Ratio mathematica 26 (2014), 21-38.

VIII.X. Ma and J.zhan , Some characterizations of regular and semisimple -rings, kyungpook Math.j.,50(2010),pp.411-417.

IX.Nobusuwa .N, on a generalization of the ring theory, Osaka J. Math, 1 (1964), 81-89.

View Download

The Usage of Chip Mental Arithmetic in The Topic of Addition and Subtraction for The Whole Number Combination in Year 1

Authors:

R. N. Farah, K. Jayalakshmi

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00033

Abstract:

This research is done to establish the usage of the Chip Mental Arithmetic for the teaching of the addition and subtraction in the whole number combination for Year 1 pupils. Besides that, it also to find out the level of efficiency in the usage of this Chip together with its module based on the performance of the Year 1 pupilson the topics mentioned above. The method used is inference analysis. After using the Mental Arithmetic Number Chip together with its module, it showed the significant differences in the Pre and Post test. The respondents of this project are Year 1 pupils of a school in Selangor who were divided into two groups, the experimental and experimental groups. The data were analyzed by using t-test to determine the differences between pupils of the control group and the experimental group. The findings showed a significant difference of 11.89 with the value [t = 2.084., p <0.05] between the pre and post test for the control group and 51.32 with [t = 2.175, p <0.05] between the pre test and post test for the experimental group. The findings of this research should reflect the usage of this Chip Mental Arithmetic as teaching aids and materials in the classroom, plays as an essential role in enhancing the performance of year 1 pupils as they learn the

Keywords:

chip mental arithmetic,addition, subtraction, whole number, teaching tools,

Refference:

I.Azlan, N.,“Isu-isu Berterusan dalam Pendidikan Matematik”, Jurnal Pendidikan dalam Pendidikan Matematik
14,19–38, 1995.
II.Farah, R.N., Bahirah, N. and Zuraida R.L, “Manipulative Kit Used In Teaching and Learning Topic Addition and Subtraction In 21st Centuries”, Int J Recent Sci Res. 9(11), 29508-29513, 2018.
III.Farah, R.N. and Bahirah, N., “Chip Mental Arithmetic Kit as A New Teaching Aids in Teaching and Learning 21st Century”, Journal of Advanced Research in Dynamical and Control Systems, Issue: 09-Special Issue, 348-352, (2018).
IV.Farah, R.N., Bahirah, N. and Zuraida, R.L., “The Effectiveness of Chip Mental Arithmetic Kit in Teaching and Learning in 21stCenturies for Topic Addition and Subtraction”, Journal of Mechanics of Continua and Mathematical Sciences, 14, 1, 2019.
V.Farah, R.N. and Chin, Y.K ., “The Effectiveness Of Colour Triciare Model InThe Topic Addition And Subtraction Of Algebra”,International Journal of Education andResearch, 5(7), 367-378, 2017.
VI.Farah, R.N., Tarmizee,. M., Rahman, K.A and Zuraida, R.L., “Orthogonal Projector Kit (OPK)
as A New Teaching Aids with Innovation ICT in Teaching and Learning 21 st century”, Journal of Fundamental and Applied Sciences, 10(3s), 338-244, 2017.
VII.Farah R.N., Tarmizee M., Karmina., Zuraida R.L and Irwan N., “Level ofInnovation Diffusion Characteristics On Orthogonal Projector Kit (OPK) As A TeachingAid For Plans And Elevation Topic”, International Journal of Recent Scientific Research, 8 (8), 19543-19546, 2017.
VIII.Hapni, M.E.,“Meningkatkan Kemahiran Murid Dalam Mempermudahkan Ungkapan Algebra Serta Kemahiran Menggunakan Kalkulator Saintifik Melalui Papan Token 10 Ungkapan Algebra Dan Permainan Ular”, 2014.
IX.Idris, N., “Pedagogi Dalam Pendidikan Matematik (1st ed.)”. Kuala Lumpur: Utusan Publications and Distributors Sdn Bhd. 2001.
X. Newfield, D., “Multimodality and Children’s Participation In Classrooms: Instances of research University of the Witwatersrand”,2006.
XI. Zuraida,R.L. , Nancy, R. and Farah, R.N., “ Effectiveness of Using Circle Geometry (CG-Board) Strategy in Learning Circle Geometry towards Form Four Students’ Performance”,American Journal of Humanities and Social Sciences Research (AJHSSR),03, 01,155-163,2019.
View Download

Evaluation of Optimal Edge Detection Operator for Localization of License Plate of Vehicles with Different Orientations

Authors:

ArbabWaseem Abbas, Khalid Saeed, Safdar Nawaz Khan Marwat, Sahibzada AbdurRehmanAbid, Muhammad Akbar Ali Khan, Sadiq Shah

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00034

Abstract:

The research conducted in this paper proposes the digital image processing approach for localization of license plate from entire image of vehicle with different angles and evaluation of the best edge detection operator in extraction of license plate. The license plate localization has vast applications in system automation, recognition and security. In this research, firstly database is developed by capturing/collecting images of 50 vehicle with different angles. Secondly in proposed technique, different edge detection operators i.e. Sobel, Roberts, Prewitt and Canny have been applied in boundary line based extraction. Thirdly results are evaluated, which showed that in proposed model Sobel operator outperforms other edge detection operators in localization of license plate and revealed the experimental results of Sobel 90%, Prewitt 85%, Roberts 40% and Canny 10% for 50images.

Keywords:

Edge Detection Operators, License Plate Localization,Boundary Line Based Extraction.,

Refference:

I.Ahmad, W., Hassan, S. A., Irfan, M. A., Bais, A., Hassan, G. M., Shah, S. A. A., &Yahya, K. M. (2010, October). Design and implementation of real time LPR system on a fixed point DSP.In Emerging Technologies (ICET),
2010 6th International Conference on (pp. 159-163).IEEE.
II.B. V. Kakani, D. Gandhi and S. Jani, 2017 “Improved OCR based automatic vehicle number plate recognition using features trained neural network,” 8th International Conference on Computing, Communication
and Networking Technologies (ICCCNT), Delhi, 2017, pp. 1-6.
III.Chang, S. L., Chen, L. S., Chung, Y. C., & Chen, S. W. (2004). Automatic license plate recognition. IEEE transactions on intelligent transportation systems, 5(1), 42-53..
IV. Dandu, B. R., & Chopra, A. (2012). Vehicular number plate recognition
using edge detection and characteristic analysis of national number plates.
Int. J. Comput. Eng. Res, 2(3), 795-799..
V.H. Kawasnicka and B. Wawrzyniak, “License Plate Localization and Recognition in Camera Pictures”, AIMETH 2002, Poland, November 2002.
VI.iying, C., Shunhua, W., Luhong, M., &Xianren, H. (2007). Design of an analog front end for passive UHF RFID transponder IC.CHINESE JOURNAL OF SEMICONDUCTORS-CHINESE EDITION-, 28(5), 686.
VII.Maini, R., &Aggarwal, H. (2009). Study and comparison of various image edge detection techniques. International journal of image processing (IJIP), 3(1), 1-11.
VIII.MITTAL, ARUN, and SUKHWINDER SINGH. “REVIEW OF LICENSE PLATE RECOGNITION (LPR) USING EDGE DETECTION.”International Journal of Computer Science Engineering and Information Technology Research (IJCSEITR) ISSN(P): 2249-6831;ISSN(E): 2249-7943 Vol. 4, Issue 2, Apr 2014, 197-204.
IX. Ruiz, L. A., Fdez-Sarría, A., &Recio, J. A. (2004, June). Texture feature extraction for classification of remote sensing data using wavelet decomposition: a comparative study. In 20th ISPRS Congress
(Vol. 35,No. part B, pp. 1109-1114).
X.Saha, S., Basu, S., Nasipuri, M., &Basu, D. K. (2009). License Plate localization from vehicle images: An edge based multi-stage approach.International Journal of Recent Trends in Engineering, 1(1), 284-289.
XI.Shrivakshan, G. T., &Chandrasekar, C. (2012). A comparison of various edge detection techniques used in image processing. IJCSI International Journal of Computer Science Issues, 9(5), 272-276.
XII.Tarabek, P. (2012, September). A Real-Time License Plate Localization Method Based on Vertical Edge Analysis. In FedCSIS (pp. 149-154).
XIII.VIT, P. (2016). Comparison of Various Edge Detection Technique.2016.
XIV.Yu, L. (2012). Research on edge detection in license plate recognition. In Second Int. Conf. Computer Application and System Modeling, Paris,France (pp. 1139-1142).
View Download

A Comprehensive Analysis of Cyber Security Attacks in Virtual Organizations with their Mitigation Plans

Authors:

Khalid Saeed, Rohi Tariq, Wajeeha Khalil, Sheeraz Ahmed, Malik Taimur Ali, Farrukh Hassan, M.Naeem Khan Khattak

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00035

Abstract:

Virtual Organization (VO) allows organizations to exchange and share resources among each other as well as they can work in collaboration. Within the VO the workers can be from different organizations and they can have different affiliation. VO offers a different model of communication among enterprises. The communication in VO is based on information and communication technology. The workers of VO communicate and perform activities using the cyber infrastructure. Since VO involves the use of cyber infrastructure which is vulnerable to different possible security attacks and these security attacks can have different consequences. This research identifies the possible vulnerabilities to VO, evaluates different security attacks as well as their consequences and mitigation plan. Moreover at the end there are some proposed guidelines to VO administrators and users to improve the security of VOs. This research paper is the extension of our previous research work.

Keywords:

Virtual Organization,Vulnerabilities,Security Attacks,Security Issues,

Refference:

I. Abdulla, P. (2012). Understanding the Impact of Denial of Service Attacks on Virtual Machines.
II. Alfieri, R., Cecchini, R., Ciaschini, V., dell’Agnello, L., Frohner, A.,Gianoli, A., …&Spataro, F. (2004). VOMS, an authorization system for virtual organizations.In Grid computing (pp. 33-40).Springer Berlin Heidelberg.
III. ARP Spoofing. Retrieved from https://www.thesecuritybuddy.com/data-breaches-prevention/what-is-
arp-spoofing/on December 8, 2018.
IV.Cummings, J., Finholt, T., Foster, I., Kesselman, C., & Lawrence, K. A. (2008). Beyond being there: A blueprint for advancing the design,development, and evaluation of virtual organizations.V. Darko-Ampem, S., Katsoufi, M., &Giambiagi, P. (2006, October).Secure negotiation in virtual organizations. In Enterprise Distributed Object Computing Conference Workshops, 2006. EDOCW’06. 10th IEEE International
(pp. 48-48). IEEE.
VI.Denial of Service Attack. Retrieved from https://www.blackmoreops.com/2015/10/21/free-dos-attack-tools/
onDecember 4, 2018.
VII. DNS Cache Poisoning. Retrieved from https://techglimpse.com/dns-cache-poison-solution-simple-terms/
on December 8, 2018.
VIII. Higgins, K. J.,Vm’screate potential risks. Technical report, darkREADING, 2007.
http://www.darkreading.com/document.asp?doc_id=117908
IX. Kamel, M., Benzekri, A., Barrère, F., &Laborde, R. (2007, June). Evaluating the Virtual Organizations security solutions using the ISO/IEC 17799 standard.In Technology Management Conference (ICE),
2007 IEEE International (pp. 1-8).IEEE.
X. Kerschbaum, F., Haller, J., Karabulut, Y., & Robinson, P. (2006, May). Pathtrust: A trust-based reputation service for virtual organization formation. In International Conference on Trust Management (pp. 193-
205).Springer, Berlin, Heidelberg.
XI.Kerschbaum, F., & Robinson, P. (2009). Security architecture for virtual organizations of business web services.Journal of Systems Architecture,55(4), 224-232.
XII. Khalil, M. E., Ghani, K., & Khalil, W. (2016, April). Onion architecture: a new approach for XaaS (every-thing-as-a service) based virtual collaborations. In Learning and Technology Conference (L&T), 2016
13th(pp. 1-7). IEEE.
XIII. Khalil, W. (2012).Reference architecture for virtual organization (Doctoral dissertation, uniwien).
XIV. Khalil, W., &Schikuta, E. (2013). A Design Blueprint for Virtual Organizations in a Service Oriented Landscape.arXiv preprint arXiv:1312.5172
XV. Khalil, W., &Schikuta, E. (2012). Virtual organization for computational intelligence. In Human-Computer Interaction: The Agency Perspective (pp. 437-464). Springer, Berlin, Heidelberg.
XVI.Kim, Y. P., Lee, S., Lee, P., & Newby, G. B. (2006, October). Grid Information Retrieval Management System for Dynamically Reconfigurable Virtual Organization.In Grid and Cooperative Computing, 2006.GCC 2006. Fifth International Conference (pp. 301-306). IEEE.
XVII. Kirch, J. (2007). Virtual machine security guidelines.The Center for Internet Security.
XVIII. Kumar, A., Patwari, A., &Sabale, S. User Authentication by Typing Pattern for Computer and Computer based devices.
XIX. Lee, C. A., Desai, N., &Brethorst, A. (2014, December). A Keystone-Based Virtual Organization Management System.In Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International
Conference on (pp. 727-730).IEEE.
XX. Li, J., Li, B., Du, Z., &Meng, L. (2010, June). Cloudvo: Building a secure virtual organization for multiple clouds collaboration. In Software Engineering Artificial Intelligence Networking and Parallel/Distributed
Computing (SNPD), 2010 11th ACIS International Conference on (pp.181-186). IEEE.
XXI.Magiera, J., &Pawlak, A. (2005). Security Frameworks for virtual organizations.In Virtual Organizations
(pp. 133-148).Springer US.
XXII. Muthaiyah, S., &Kerschberg, L. (2007). Virtual organization security policies: An ontology-based integration approach. Information Systems Frontiers,9(5), 505-514.
XXIII. Phishing Attack. Retrieved from https://www.cloudflare.com/learning/security/threats/phishing-attack/
on December 8, 2018.
XXIV. Securing Virtual Applications and Servers. Retrieved from http://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/unified-network-services-uns/white_paper_c11-652663.pdf on March 17
, 2016.
XXV. Sinnott, R. O., Chadwick, D. W., Doherty, T., Martin, D., Stell, A.,Stewart, G., …& Watt, J. (2008, May). Advanced security for virtual organizations: The pros and cons of centralized vs decentralized security
models. In Cluster Computing and the Grid, 2008.CCGRID’08. 8th IEEE International Symposium on
(pp. 106-113). IEEE.
XXVI. Sniffing Networks Part 2 – MAC addresses, IP. Retrieved from http://securitymusings.com/article/tag/arp-spoofing on March 17, 2016.
View Download

Pairing-free Partially Blind Message Recovery Signature Scheme with Application To Online e-Cash Payment System

Authors:

Salome James, P. Vasudeva Reddy

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00036

Abstract:

Blind signature plays a significant role in practical applications such as ecash and e-voting systems, where anonymity is of great importance. A partially blind signature enables a signer to explicitly incorporate a pre-agreed common information into a blind signature without the loss of blindness property. In recent years, many cryptographic researchers have made substantial progress in the design of blind signature schemes. In order to improve the efficiency, in this paper, we propose a new pairing free partially blind signature scheme with message recovery in the identity-based frame work. The proposed scheme is existentially unforgeable with the assumption that the Elliptic Curve Discrete Logarithm Problem (ECDLP) is hard. We compare our scheme to the well known existing identity-based partially blind signature schemes. With pairing free realization and the message recovery features, the proposed scheme is more efficient in terms of computation and communication point of view. Finally, we present an electronic-cash payment system based on our PF-IDPBS-MR scheme.

Keywords:

Digital signatur,Partially Blind signatu,ECDL, ID-based Cryptography,Message Recovery,E-cash,

Refference:

I.Abe, E and Fujisaki. “How to Date Blind Signatures”. Asiacrypt’96, LNCS 1163, Springer-Verlag, pp 244-251 (1996).
II.Abe, M and Okamoto, T. “Provably secure partially blind signatures”.In: Proceedings of 20th Annual Cryptology Conference on Advances in Cryptology, Santa Barbara, CA, August 20–24, 2000. Lecture Notes in
Computer Science, Springer, New York,Vol. 1880, pp 271–286 (2000).
III.Barreto, P; Kim, H.Y and Lynn, B. “Efficient Algorithms for Pairing based Cryptosystems”. LNCS, Springer-Verlag, Vol. 2442, pp 354–368 (2002).
IV.Cao, X; Kou, W and Du, X. “A Pairing –free Identity Based Authenticated Key Agreement Protocol with Minimal Message Exchanges”. Information Sciences, Vol. 180, No.15, pp 2895–2903 (2010).
V.Chaum, D. “Blind signatures for untraceable payments”. In Advances in Cryptology-Proceedings of CRYPTO’82, Springer-Verlag, New York, pp 199-203 (1983).
VI.Chen,W; Qin, B; Wu, Q; Zhang, L and Zhang, H. “ID-based partially blind signatures : A scalable solution to multi-bank e-cash, International conference on signal processing systems”. IEEE, DOI 10.1109/ICSPS.2009.121 (2009).
VII.Chow, S; Hui, L; Yiu, S and Chow, K. “ Two improved partially blind signature schemes from bilinear pairings”. In: Proceedings of 10th Australasian Conference on Information Security and Privacy, Brisbane,
Australia, Lecture Notes in Computer Science, Springer, New York, Vol. 3574 (2005).
VIII.Fan, C.I and Lei, C.L. “ Low-computation partially blind signatures for electronic cash”. IEICE Trans. Fund. Electron. Commun. Comput. Sci. E81-A(5), pp 818–824 (1998).
IX.Hafizul Islam, S.K; Amin, R; Biswas, G.P; Obaidat, M.S and Khan, M.K. “Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System”. Arab J Sci Eng, Vol.41, No. 8, pp 3163-3176 (2016).
X.Hu, X and Huang, S. “An efficient ID-based partially blind signature scheme”. In software engineering, artificial intelligence, networking, and parallel/distributed computing, SNPD, IEEE, Eighth ACIS international
conference, pp 291-296 (2007).
XI.Koblitz, N. “Elliptic curve cryptosystem”. Journal of Mathematics of Computation, Vol. 48, No.177, pp 203-209 (1987).
XII.Li, F; Zhang, M and Takagi T. “Identity-based partially blind signature in the standard model for electronic cash”. Mathematical and Computer Modelling 58 pp 196–203 (2013).
XIII.Mahender Kumar and Katti, C.P. “An efficient ID-based partially blind signature scheme and application in electronic-cash payment system”.ACCENTS Transactions on Information Security, Vol. 2, No. 6, ISSN, pp
2455-7196 (2016).
XIV.Miller, V.S. “Use of elliptic curves in cryptography”. In Proceeding on Advances in cryptology-CRYPTO 85, Springer-Verlag, New York, LNCS,Vol. 218, pp 417-426 (1985).
XV.Nyberg, K and Rueppel, R.A. “A New Signature Scheme based on the DSA giving Message Recovery”. In Proc. of 1st ACM conference on communication and computer security, Virginia, USA, pp 58-61 (1993).
XVI.Paterson, K.G and Schuldt, J.C.N. “Efficient identity-based signatures secure in the standard model”. In: Information Security and Privacy—ACISP 2006,in: LNCS,Vol. 4058, Springer-Verlag, pp 207–222 (2006).
XVII.Pointcheval, D and Stern, J. “Security arguments for digital signatures and blind signatures”. Journal of Cryptology, Springer-Verlag, Vol.13, No.3, pp361-396 (2000).
XVIII.Shamir, A. “Identity-based Cryptosystems and Signature Schemes”. Crypto ’84, Springer-Verlag, LNCS Vol. 196, pp 47-53 (1985).
XIX.Shamus Software Ltd. Miracl Library. Available: http://certivox.org/display/EXT/MIRACL.
XX.Tahat, N. “A New Design Partially Blind Signature Scheme Based on Two Hard Mathematical Problems”.World Academy of Science, Engineering and Technology, International Journal of Mathematical and Computational Sciences Vol. 6, No. 8, (2012).
XXI.Tan, S.Y; Heng, S.H and Goi, B.M. “Java Implementation for Pairing-based Cryptosystems”. In: Taniar D., Gervasi O., Murganate B., Pardede E.,Apduhan B. O. (Eds.), Computational Science and its Applications- ICCSA- 2010, LNCS, Springer, Berlin, Heidelberg, 6019, pp 188-198 (2010).
XXII.Tian, X.X; Li, H. J; Xu, J.P and Wang Y. “A security enforcement ID-based partially blind signature scheme”. In International conference on web information systems and mining,IEEE, pp 488-92 (2009).
XXIII.Tseng, Y.M; Wu, T.Y and Wu, J.D. “Forgery attacks on an ID-based partially blind signature scheme”. International Journal of Computer Science. Vol. 35, No.3, pp 301-304 (2008).
XXIV.Wang, H and Zhang,Y. “A protocol for untraceable electronic cash”. In international conference on web-age information management, Springer Berlin Heidelberg, pp 189-197 (2000).
XXV.Wang, H; Zhang,Y and Cao, J. “An electronic cash scheme and its management”. Concurrent Engineering, Vol.12, No. 3, pp 247-257 (2004).
XXVI.Zhang, F; Safavi-Naini, R and Susilo, W. “Efficient verifiably encrypted signature and partially blind signature from bilinear pairings”. In: Proceedings of the 4th International Conference on Progress in Cryptology-INDOCRYPT, Springer, New York, Vol. 2904, pp 191–204 (2003).
XXVII.Zhang, X. “New randomized partially blind signature scheme”. International Conference on Computer Science and Electronic Technology (ICCSET2014).
XXVIII.Zhang, Y and Chen M. “The standard model enhanced ID based partially blind signature”. Journal of Sichuan University (Engineering Science Edition), Vol. 01, pp 95-101 (2014).
View Download

Comparison IFOC Scheme of Three Phase Optimal 63 Level Multilevel Inverter Connected Induction Motor using FLC and ANFIS

Authors:

Mr. Bolla Madhusudana Reddy, Y.V.Siva Reddy , M.Vijaya Kumar

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00037

Abstract:

This paper proposes initially an optimal structured single phase 63 level Multi level Inverter-(MLI) with Sinusoidal Pulse Modulation-(SPWM) and it can be extended to three phase 63 level MLI which is built with three individual single phase 63 level MLIs connected in star form and later it is fed to three phase star winding induction motor drive. The proposed MLI generates more number of levels with minimum switches, DC sources, low switching losses and reduced THD while compared with traditional MLIs. In the next subsequent case indirect field Oriented Control (IFOC) method is implemented through fuzzy Logic Controller-((FLC) of optimal 63 level MLI feeding induction motor(IM) drive for checking speed of motor, sudden load variation, parameters changes. Later the same method of AC drive tested with Adaptive Neuro Fuzzy Inference System (ANFIS) which gives better performance than AC drive with FLC. The proposed optimal MLI fed IM drive with IFOC gives improved performance using ANFIS in view of its high-quality dynamic performance and minimum THD.

Keywords:

MLI,FLC,ANFIS,IFOC,THD ,

Refference:

I.Ali saghafinia et.al. , “Adaptive fuzzy sliding mode control into chattering free IM drive”,IEEE trans., vol 51,no 1,Jan 2015.
II.Ataollah Makhberdonran et al., “Symmetrical and asymmetrical design of new cascaded multilevel inverter”, IEEE trans., vol 29,no 12,Dec 2014.
III.EiI Badsi et al., “DTC scheme for four switch inverter fed induction motor emulating six switch inverter”,IEEE trans., vol 28,no.7,Jul 2013.
IV.M.M Uddin, “Performances of fuzzy logic based indirect vector control for induction motor drive”,IEEE trans. Vol 38,no.5 Sept 2014.
V.M.Nasir uddin , “Development and implementation of simplified self tuned neuro fuzzy based IM drive”,IEEE trans.,vol 50,no1 Jan 2014.
VI.Mohammad fahadi kangarlu et al. “A generalized cascaded multilevel inverter using series connection of sub multilevel inverters”, IEEE trans. vol 28, no 2 Feb 2013.
VII.Mohamed S.Zaky et al., “A performance investigation of four switch three phase inverter fed IM drive at low speed using PI & FLC , IEEE trans. On Power Electronics , 2016.
VIII.Muvungu masiala, et al. “Fuzzy self tuning speed control of indirect field oriented control induction motor drive”, IEEE tran., vol44,no 6, Nov 2008.
IX.P.Ganesh et al., “Single phase 63 level modular multilevel inverter fed induction drive for solar PV applications”, IEEE explore, Aug 2018.
X.Yonsoo cho, et al. “Torque ripple reduction & fast torque response strategy for predictive torque
control of induction motor”, IEEE Trans. On Power Electronics, Jun 2017.
View Download

Face Recognition using Deep Neural Networks

Authors:

Amirhosein Dastgiri, Pouria Jafarinamin, Sami Kamarbaste, Mahdi Gholizade

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00038

Abstract:

Face recognition is one of the most important issues in the machine vision, which has many applications in the industry and other issues related to the vision of the machine. There are many algorithms in the field of machine learning to detect facial expressions. In recent years, deep neural networks are one of the areas of research. Because of its excellent performance, this technique is widely used in face recognition. Facial features are useful for a variety of tasks, and the application of deep neural network is very fast. In this paper, a method for recognition of facial expressions is presented using the features of the deep neural network. A deep neural network is used to summarize images and classify them. The proposed model focuses on identifying the faces of a person from a single image. The work algorithm is a multilayer neural network with a deep learning concept. The results show that in some cases, the recognition rate is very high.

Keywords:

face mode,deep neural network,deep learning,

Refference:

I.A. Kortylewski, B. Egger and A. Schneider.Empirically Analyzing the Effect of Dataset Biases on Deep Face Recognition Systems. Computer Vision and Pattern Recognition (CVPR), 2018.
II.Byeon YH, Kwak KC. Facial expression recognition using 3d convolutional neural network. Int J Adv Comput Sci Appl 5(12):107-112, 2014.
III.C. Benjamin and M. Ennio. Mitigation of effects of occlusion on object recognition with deep neural networks through low level image completion,”Computational Intelligence and Neuroscience, vol. 2016, Article ID 6425257, 15 pages, 2016.
IV.Chen, Xue-wen, Melih Aslan, Kunlei Zhang, and Thomas Huang.Learning multi-channel deep feature representations for face recognition”, In Feature Extraction: Modern Questions and Challenges, pp. 60-71, 2015.
V.Fakhari, Ali; Moghadam, Amir Masoud Eftekhari. Combination of classification and regression in decision tree for multi-labeling image annotation” Applied Soft Computing Volume 13 issue 2, 2013.
VI.Guosheng Hu and Xiaojiang Peng. Frankenstein: Learning deep face representations using small data”, IEEE Transactions on Image Processing, 2017.
VII.H.Xiong, S.Szedmak and J. Piater, “ Scalable, Accurate Image Annotation with Joint SVMs and Output Kernels, Neurocomputing”, Vol., No. 2015.
VIII.Hansen, M. F. , Smith, M. , Smith, L. , Salter, M. , Baxter, E. , Farish, M. and Grieve, B. and AB Agri, SRUC, Manchester University, Towards on-farm pig face recognition using convolutional neural networks.
Computers in Industry,98. pp. 145-152. ISSN 0166-3615 Available from: http://eprints.uwe.ac.uk/35276, 2018.
IX.J. Zeng, X. Zhao, Q. Chuanbo et al. Single sample per person face recognition based on deep convolutional neural network,” in Proceedings of IEEE International Conference on Computer and Communications (ICCC), pp. 1647–1651, Chengdu, China, December, 2017.
X.J. Zeng, X. Zhao, Y. Zhai, J. Gan, Z. Lin, and C. Qin. A novel expanding sample method for single training sample face recognition,” in Proceedings of International Conference on Wavelet Analysis and Pattern Recognition (ICWAPR), pp. 33–37, Ningbo, China, , 2017.
XI.Jing Zhang, Yaxin Zhao, Da Li, Zhihua Chen, and Yubo Yuan. A novel image annotation model based on content representation with multi-layer segmentation.Neural Comput. Appl. 26, 6,1407-1422.
DOI=http://dx.doi.org/10.1007/s00521-014-1815-6,. 2015.
XII.Jing Zhang• Yaxin Zhao• Da Li “A novel image annotation model based on content representation with multi-layer segmentation” The Natural Computing Applications Forum, 2015.
XIII.Jiwei Hu; Kin-Man Lam “An efficient two-stage framework for image annotation” Pattern Recognition Volume 46 issue 3, 2013.
XIV.K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, “Joint face detection and alignment using multitask cascaded convolutional networks,” IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499-1503, 2016.
XV.L.Agapito et al. “Mixing Low-Level and Semantic Features for Image Interpretation A Framework and a Simple Case Study”: ECCV 2014 Workshops, Part II, LNCS 8926, pp. 283–298.DOI: 10.1007/978-3-319-16181-520, 2015.
XVI.M.Saraswathi and S. Sivakumari.Evaluation of PCA and LDA techniques for Face recognition using ORL face database”, (IJCSIT) International Journal of Computer Science and Information Technologies, Volume 6 (1), 2015, pp. 810-813, 2015.
XVII.Nur Ateqah Binti Mat Kasim, Nur Hidayah Binti Abd Rahman, Zaidah Ibrahim, Nur Nabilah Abu Mangshor. Celebrity Face Recognition using Deep Learning. Indonesian Journal of Electrical Engineering and Computer Science.Vol. 12, No. 2, pp. 476~481, 2018.
XVIII.S. S. Farfade, M. J. Saberian, and L.-J. Li, “Multi-view face detection using deep convolutional neural networks ,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XIX.S. S. Farfade, M. J. Saberian, and L.-J. Li. Multi-view face detection using deep convolutional neural networks,” in Proceedings of the 5th ACM on International Conference on Multimedia Retrieval, pp. 643-650: ACM, 2015.
XX.Savath Saypadith and Supavadee Aramvith.Real-Time Multiple Face Recognition using Deep Learning on Embedded GPU System. Proceedings,APSIPA Annual Summit and Conference 201812-15 November, 2018.
XXI.Shraddha Arya and Arpit Agrawal.Face Recognitionwith Partial Face Recognition and Convolutional Neural Network. International Journal of Advanced Research in Computer Engineering & Technology
(IJARCET)Volume 7, Issue 1, 2278–1323, 2018.
XXII.Y. Li, W. Shen, X. Shi, and Z. Zhang.Ensemble of randomized linear discriminant analysis for face recognition with single sample per person,” in Proceedings of IEEE International Conference and Workshops on Automatic Face and Gesture Recognition, pp. 1–8, Shanghai, 2013.
XXIII.Zhiming Qian, Ping Zhong, Jia Chen, Integrating Global and Local Visual Features with Semantic Hierarchies for Two-Level Image Annotation,Neurocomputing,http://dx.doi.org/10.1016/j.neucom. 07.094
, 2015.
View Download

Adopting Modern Energy Conservation Measures to Enhance Building Energy Efficiency

Authors:

M. Yousaf Ali Khan, Imran Abbas, Shahid Atiq, Sheeraz Ahmed, AmadUd Din, Muhammad Fahad

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00039

Abstract:

Energy efficiency has been an immense importance in worldwide particularly in large educational institutes which are often left unnoticed as a contributor to energy consumers in Pakistan. The institute budget for energy cost has assumed to be the major costs and minimizing the energy bill in a large institute has become a big challenge. The targeted actions can be used to minimize the electricity consumption. The savings on energy provides a chance to reinvest it for the institute. In this work, energy assessment of Government College of Technology (GCT) campus Bhakkar is done to identify potential energy savings and to enhance the awareness, responsiveness for energy conservation amongst the community of the campus. The data about the installed load is collected by visiting each department. This work explained in details of the power consumption of different electrical devices installed in the institute and energy usage by those devices for a month is analysed. The work showed that a significant energy savings up to 50 % is achieved if old electrical devices are replaced with latest Energy conserving devices. Many facts corresponding the ECM devices are also encoded in this work and payback time is computed for the devices. Few basic ECMs are recommended to be followed by the institute which is technically and economically more reasonable. The benefits of implementing the energy efficiency measures in buildings are substantial both in terms of energy savings and cost savings.

Keywords:

Energy Audit, Energy Conservation,Energy Conservation Measure(ECMs) ,

Refference:

I.C.P. Ahila, and W.J.J. Femi. “Energy audit in ladies hostel.” In TENCON -TENCON 2015 – 2015 IEEE Region 10 Conference.
II.D. Rathod, Deepak, R.Khandare, and A. K. Pandey. “Electrical Energy Audit (A Case Study OfTobbaco Industry).” International Journal of Engineering, 2013, Vol. No. 3, pp. 9-18.
III.G. Sultana, and H.U. Harsha. “Electrical Energy Audit a case study.” IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE), 2015, Vol. 10, no. 3, pp 1-6.
IV.H. Singh, M. Seera, and M. A. M.Idin. “Electrical energy audit in a Malaysian university- A case study.” International Conference on Power and Energy (PECon), IEEE, 2012, pp. 616-619.
V.K.P. Amber, and N. Ashraf. “Energy outlook in Pakistan.” International Conference on Energy Systems and Policies (ICESP), IEEE, 2014.
VI.K.R.Shailesh, S. Tanuja, M. Kumar, and R.A. Krishna. “Energy consumption optimisation in classrooms using lighting energy audit.”National Conference on Challenges in Research & Technology in the Coming Decades (CRT 2013).
VII. M. Ahmad, M. Shafique, M. A. Aslam, M. N. Khan, and R. Y. Khan. “Personal energy independence a short-term solution for ongoing energy crisis in Pakistan using home solar grid.” International Conference on Energy Systems and Policies (ICESP),IEEE, 2014.
VIII.M. Kumar, P. H. Shaikh, F. Shaikh, and M. A.Uqailli. “Energy Conservation through Motors in Pakistan’s Industrial Sector-Need to use of Energy Efficient Motors.” International Journal of Computer Applications, 2012,
Vol. 54, No. 5.
IX.M. S. Isasare, and S. A. Zadey. “A case study: Energy audit at AVBRH, Sawangi (M), Wardha.” International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT),IEEE, 2016.
X.N.M. Maricar, and M. H. Othman. “Energy audit application for building of small and medium enterprise.” Saudi InternationalElectronics,Communications and Photonics Conference (SIECPC), IEEE, 2013.
XI.S.A.R.Shah, M. M. Saleem, H. Rehman, and B. Khan. “The cost for economic growth: A study on the energy demand of Pakistan using TIMES.”, Power Generation System and Renewable Energy Technologies
(PGSRET),IEEE, 2015.
XII.S. N. Chaphekar, R. A.Mohite, and A. A. Dharme. “Energy monitoring by energy audit and supply side management.”International Conference on Energy Systems and Applications , IEEE 2015.
XIII.S.P. Parthe, and S.Kompeli. “Energy Audit and Conservation Tool for Energy Efficiency.” International Research Journal Engineering and Technology (IRJET) 2015, Vol.2,No.8, pp 747-751.
XIV.T. Fiedler and P.M. Mircea. “Energy Management systems according to the ISO 50001 standard, Challenges and benefits.” International Conference on Applied and Theoretical Electricity (ICATE), IEEE, 2012.
View Download

Fostering Conditions for Innovative Reforms in Public Sector Organizations and Their Response to Artificial Intelligence

Authors:

Sayyed Khawar Abbas, Muhammad Aftab

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00040

Abstract:

The paper is intended to investigate the foster effects of political instability, leadership influence, experimentation and budget constraints responsible for poor performance and feedback from public sector organizations. Keeping in view the purpose of the study, the research framework for the study is descriptive. Firstly, Primary data is collected through questionnaires from individuals engaged with public sector organizations. Secondly, unstructured interviews conducted to explore the effect of Artificial intelligence. Through research analysis, the empirical evidence suggest that the innovation activity is intrigued with important conditions responsible for the performance of public sector organization. Political instability suggested negative significance while others have demonstrated positive significance concerning innovation reforms. Artificial Intelligence also demonstrates a strong scope for future public sector organizations. In the following research framework, the data is based on the judgments of employees engaged with public sector organizations. The responses are individual self-reported and not objective, so there is a fair possibility that response would be biased. Furthermore, the responses are from Pakistan’s main cities which cannot be generalized to various countries. This study focuses on the performance of the public sector organization. A large amount of literature has emerged on the likelihood of innovation reforms for private sector firms over the course of time. This paper is widening the horizon to study the likelihood of innovation reforms for public sector organizations by adhering the innovation culture and identifying important factors which may influence. The paper also provides a base for finding more dimensions to implement innovation reforms and also guide policymakers to execute efficient policies. Furthermore, the study is based on questions covering “what” and “how” dimensions. This type of quantitative study lacks for “why” dimension. Therefore, semi-structured interviews and case analysis could explain more regarding innovation reforms. The research framework is the first attempt to examine the impact of different conditions on the implementation of innovation and Artificial intelligence influence in public sector organizations in Pakistan.

Keywords:

Public sector organizations, Innovation reforms, political instability,leadership influence, experimentation, budget constraints, OECD (Organization for Economic Cooperation and Development, ICT (Information and communication technology),Artificial Intelligence,

Refference:

I.Albury, D. (2005). Fostering innovation in public services.Public money and management, 25(1), 51-56.
II.Anthony, A., & Dorothea, H. (2013). From too little to too much innovation?Issues in measuring innovation in the public sector. Structural Change and Economic Dynamics, 27, 27(C), 146-159.
III.Arfeen , M. I., & Khan , P. N. (2009). Public Sector Innovation: Case study of e-government projects in Pakistan.The Pakistan Development Review,439-457.
IV.Arundel , A., Casali, L., & Hollanders, H. (2015). How European public sector agencies innovate: The use of bottom-up,policy-dependent and knowledge-scanning innovation methods.Research Policy, 44(7), 1271-1282.
V.Audretsch, D., & Demircioglu, M. (2017). Conditions for innovation in public sector organizations.Research Policy, 46(9), 1681-1691.
VI.Bommert, B. (2010). “Collaborative innovation in the public sector”.International Public Management Review
, 11(1),15-33.
VII.Bugge, M. M., & Bloch, C. (2016). Between bricolage and breakthroughs—framing the many faces of public sector innovation.Public Money & Management, 36(4), 281-288.
VIII.Butt, F. S., Rafique, T., Nawab, S., Khan, N. A., & Raza, A. (2013). Organizational Transformation in Public Sector Organizations of Pakistan in the Quest of Change Management.Research Journal of Applied Sciences,
Engineering and Technology, 6(16): 3086-3093.
IX.Chesbrough, H. (2003). “The logic of open innovation: managing intellectual property”. California Management Review, 45(3), 33-58.
X.Demircioglu, M. A. (2017). Conditions for innovation in public sector organizations. Research Policy
, 46(9), 1681-1691.
XI.Gallup Organization. (2011).Analytical Report – Innovation in Public Administration: Report.Gallup Organization.
XII.Gassmann, O. (2006). “Opening up the innovation process: towards an agenda”.R&D Management
, 36(3), 223-8.
XIII.Goodman, J. (2016). Robots in Law: How Artificial Intelligence is Transforming Legal Services.
Ark Group. ISBN 978-1-78358-264-8.
XIV.Iqbal, M. Z., Rehan, M., Fatima, A., & Nawab, S. (2017). The Impact of Organizational Justice on Employee Performance in Public Sector Organization of Pakistan.International Journal of Economics &
Management Sciences, (6)3, 1-6.
XV.Koch, P., & Hauknes, J. (2005). On innovation in the public sector – today and beyond. Oslo: Publin.
XVI.Lee, S. M., Hwang, T., & Choi, D. (2012). Lee, S. M., Hwang, T., & Choi, D. (2012). Open innovation in the public sector of leading countries.Management decision,. Management Decision, 50(1), 147-162.
XVII.Lopez, V., & Whitehead, D. (2013). Sampling data and data collection inqualitative research.Nursing and Midwifery Research: Methods and Critical Appraisal for Evidence-based Practice, 124-140.
XVIII.Luc, B., & Hafsi, T. (2007). The changing nature of public entrepreneurship. 67(3), 488-503.: Public Administration Review,.
XIX.Maranville, S. (1992). “Entrepreneurship in the Business Curriculum”. Journal of Education for Business.
, 68(1), 27–31.
XX.Ng, A. (2017, September 22). IBM’s Watson gives proper diagnosis after doctors were stumped. Newyork: NY Daily News.
XXI.OECD. (2014). Innovating the Public Sector: from Ideas to Impact. OECD Conference Centre, Paris
(pp. 1-40). Paris: OECD Conference Centre, Paris.
XXII.Palmer , C., & Kaderdina , F. (2017). Public sector innovation: From ideas to actions. UK: Ernst & Young Global Limited.
XXIII.Russell, S. J., & Norvig, P. (2009). Artificial Intelligence: A Modern Approach. Upper Saddle River, New Jersey: Prentice Hall. ISBN 0-13-604259-7.
XXIV.Sahni, N. R., Wessel, M., & Chr, C. M. (2013). Unleashing breakthrough innovation in government.
Stanford Soc. Innovation Rev, 11(3), 27-31.
XXV.Schweitzer, J. (. (2014). Leadership and innovation capability development in strategic alliances.
Leadership & Organization Development Journal, 35(5),442-469.
XXVI.Smith, S. (2013). Fundamentals of marketing research.Thousand Oaks, CA:SAGE Publications.
XXVII.Torugsa, N., & Arundel, A. (2017). Rethinking the effect of risk aversion on the benefits of service innovations in public administration agencies.Research Policy, (5), 900-910.
XXVIII.UNDP Pakistan. (2018, February). Governance Reforms and Innovation. Retrieved from SUSTAINABLE DEVELOPMENT GOALS: United Nations Development Programme:http://www.pk.undp.org/content/pakistan/en/home/operations/projects/democ ratic_governance/governance-reforms-and-innovation-.html
XXIX.Wynen Jan, Verhoest, K., Ongaro, E., & Thie, S. V. (2014). Innovation-oriented culture in the public sector: Do managerial autonomy and result control lead to innovation?Public Management Review
, 16(1), 45-66
View Download

VSM Based Models and Integration of Exact and Fuzzy Similarity For Improving Detection of External Textual Plagiarism

Authors:

Nasreen J. Kadhim, Mohannad T. Mohammed

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00041

Abstract:

A rapid growing has occurred for the act of plagiarism with the aid of Internet explosive growth wherein a massive volume of information offered with effortless use and access makes plagiarism − the process of taking someone else’s work (represented by ideas, or even words) and representing it as his own work − easy to be performed. For ensuring originality, detecting plagiarism has been massively necessitated in various areas so that the people who aim to plagiarize ought to offer considerable effort for introducing works centered on their research. In this paper, a work has been proposed for detecting textual plagiarism focused on proposing models for both candidate retrieval and detailed comparison phases. Firstly, for the candidate retrieval, two models have been proposed established on adopting the vector space method VSM as a retrieval model wherein these models base on offering different representations for text documents. The first model centers on representing documents as vectors consisting of average term 𝑡𝑓 − 𝑖𝑠𝑓 weights instead of representing them as vectors of term 𝑡𝑓 − 𝑖𝑑𝑓 weight. Whereas, the second retrieval model assigns for each term constituting the document a weight resulted from a weighted sum equation that sums this term 𝑡𝑓 − 𝑖𝑑𝑓 weight with its average 𝑡𝑓 − 𝑖𝑠𝑓 weights and considers it as a query for retrieval. The detailed comparison task comes as the second phase wherein a method has been proposed that cores at the integration of two diverse similarity measures and the introduction of one similarity measure involving them; Exact similarity and Fuzzy similarity. Experiments have been conducted using PAN-PC-10 as an evaluation dataset for evaluating the proposed system. As the problem statement in this paper is restricted to detect extrinsic plagiarism and works on English documents, experiments have been performed on the portion dedicated for extrinsic detection and on documents in English language only. These documents have been randomly separated into training and testing dataset. The training data has been used for parameters tuning whereas evaluating the performance of the proposed system and comparing it against the existing methods have been performed using testing dataset. For evaluating performance of the models proposed for the candidate retrieval problem, Precision, Recall, and F-measure have been used as an evaluation metrics. The overall performance of the proposed system has been assessed through the use of the five PAN standard measures Precision, Recall, F-measure, Granularity and 𝑃𝑙𝑎𝑔𝑑𝑒𝑡 . The experimental results has clarified that the proposed system either comparable or outperforms the other state-of-the-art methods.

Keywords:

VSM,TF-IDF, TF-ISF, exact similarit, Jaccard similarity, fuzzy similarity,

Refference:

I.A.Abdi, et al., A linguistic treatment for automatic external plagiarism detection. 2017. 135: p. 135-146.
II.A.Sarkar, U. Marjit, and U. Biswas. A conceptual model to develop an advanced plagiarism checking tool based on semantic matching. in 2014 2nd International Conference on Business and Information Management
(ICBIM). 2014. IEEE.
III.A.Abdi, et al., PDLK: Plagiarism detection using linguistic knowledge.2015. 42(22): p. 8936-8946.
IV.B.Gipp, Citation-based plagiarism detection, in Citation-based plagiarism detection. 2014, Springer. p. 57-88.
V.D.E.J.A.C.Appelt, Introduction to information extraction. 1999. 12(3): p.161-172.
VI.G.Oberreuter and J.D.J.E.S.w.A. VeláSquez, Text mining applied to plagiarism detection: The use of words for detecting deviations in the writing style. 2013. 40(9): p. 3756-3763.
VII.K.Vani and D. Gupta. Investigating the impact of combined similarity metrics and POS tagging in extrinsic text plagiarism detection system. in 2015 International Conference on Advances in Computing,
Communications and Informatics (ICACCI). 2015. IEEE.
VIII.L.Prechelt, G. Malpohl, and M.J.J.U. Philippsen, Finding plagiarisms among a set of programs with JPlag. 2002. 8(11): p. 1016-.
IX.M .Alzahrani, S, et al., Uncovering highly obfuscated plagiarism cases using fuzzy semantic-based similarity model. 2015. 27(3): p. 248-268.
X.M.Roig, Avoiding plagiarism, self-plagiarism, and other questionable writing practices: A guide to ethical writing. 2006.
XI.M.Potthast, et al., Cross-language plagiarism detection. 2011. 45(1): p. 45-62.
XII.R.Lukashenko, V. Graudina, and J. Grundspenkis. Computer-based plagiarism detection methods and tools: an overview. in Proceedings of the 2007 international conference on Computer systems and
technologies. 2007. ACM.J. Mech. Cont.& Math. Sci., Vol.-14, No.-3, May-June (2019) pp 555-578
Copyright reserved © J. Mech. Cont.& Math. Sci.Nasreen J. Kadhim et al.578
XIII.S.Wang, et al. Combination of VSM and Jaccard coefficient for external plagiarism detection. in 2013 International Conference on Machine Learning and Cybernetics. 2013. IEEE.
XIV.S.Rao, et al., External & Intrinsic Plagiarism Detection: VSM &Discourse Markers based Approach Notebook for PAN at CLEF 2011.2011.
XV.S. Alzahrani and N. Salim, Fuzzy Semantic-Based String Similarity for Extrinsic Plagiarism Detection Lab Report for PAN at CLEF 2010.2010.
XVI.S.M.Alzahrani, et al., Understanding plagiarism linguistic patterns,textual features, and detection methods. 2012. 42(2): p. 133-149.
View Download

A Robust and Efficient Finger Print Combination form Privacy Protection

Authors:

Abdullah S. Alotaibi

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00042

Abstract:

Now a day’s fingerprint techniques are widely used in authentication systems, therefore its privacy protection becomes an important issue. Securing a stored fingerprint template is very important because once fingerprints are compromised, it cannot be easily revoked. So, we review here a new system for preserving fingerprint confidentiality. In this system, the fingerprint privacy is maintained by combining two special fingerprints keen on a original identity. In the enlistment phase, two fingerprints need aid taken from two different fingers. We acquire the minutiae positions about one fingerprint, the introduction from claiming another fingerprint, and the reference focuses starting with both fingerprints. In view of those gotten information, a joined minutiae format may be created Also saved previously, a database. In the Confirmation phase, we utilize the fingerprints of the same fingers that need aid at that point utilized within enlistment stage. For same 2 finger prints against a mutual minutiae template, a two-stage fingerprint matching process is used. By storing the combined minutiae template in the database, the complete minutiae characteristic of a single fingerprint will not be compromised when the database is stolen by the attackers. The joined minutiae format will be changed over under a real-look indistinguishable joined together finger impression by utilizing existing finger impression reproduction approach. These effects under another virtual character to those two different fingerprints.

Keywords:

Fingerprint,Combination,Protection,Minutiae,Privacy ,

Refference:

I.A. Kong, K.-H. Cheung, D. Zhang, M. Kamel, and J. You, “An analysis of biohashing and its variants,” Pattern Recognit., vol. 39, no. 7, pp. 1359–1368,2006.
II.A. Nagar, K. Nandakumar, and A. K. Jain, “Biometric template transforma- tion: A security analysis,” in Proc. SPIE, Electron. Imaging, Media Forensics and Security, San Jose, Jan. 2010.
III.A. Othman and A. Ross, “Mixing fingerprints for generating virtual identi- ties,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS),Foz do Iguacu, Brazil, Nov. 29–Dec. 2, 2011.
IV.A. Ross and A. Othman, “Mixing fingerprints for template security and priva-cy,” in Proc. 19th Eur. Signal Proc. Conf. (EUSIPCO), Barcelona, Spain, Aug.29–Sep. 2, 2011.
V.B. Yanikoglu and A. Kholmatov, “Combining multiple biometrics to protect privacy,” in Proc. ICPR- BCTP Workshop, Cambridge, U.K., Aug. 2004.
VI.B. J. A. Teoh, C. L. D. Ngo, and A. Goh, “Biohashing: Two factor authentica-tion featuring fingerprint data and tokenised random number,” Pattern Recog-nit., vol. 37, no. 11, pp. 2245–2255, 2004.
VII.E. Camlikaya, A. Kholmatov, and B. Yanikoglu, “Multi-biometric templates using fingerprint and voice,” Proc. SPIE, vol. 69440I, pp. 69440I-1–69440I-9,2008.
VIII.K. G. Larkin and P. A. Fletcher, “A coherent framework for fingerprint analy-sis: Are fingerprints holograms?,” Opt. Express, vol. 15, pp. 8667–8677, 2007.
IX.K. Nandakumar, A. K. Jain, and S. Pankanti, “Fingerprint-based fuzzy vault:Implementation and performance,” IEEE Trans. Inf. Forensics Security, vol. 2,no. 4, pp. 744–57, Dec. 2007.
X.N. K. Ratha, S. Chikkerur, J. H. Connell, and R. M. Bolle, “Generating can-celable fingerprint templates,” IEEE Trans. Pattern Anal. Mach. Intell., vol.29, no. 4, pp. 561–72, Apr. 2007
XI.S. Li and A. C. Kot, “A novel system for fingerprint privacy protection,” in Proc. 7th Int. Conf. Inform. Assurance and Security (IAS), Dec. 5–8, 2011, pp.262–266.
XII.S. Li and A. C. Kot, “Privacy protection of fingerprint database,” IEEE Signal Process. Lett., vol. 18, no. 2, pp. 115–118, Feb. 2011. [9] A. Ross and A.Othman, “Visual cryptography for biometric privacy,” IEEE Trans. Inf. Fo-rensics Security, vol. 6, no. 1, pp. 70–81,Mar. 2011.
XIII.S. Li and A. C. Kot, “Attack using reconstructed fingerprint,” in Proc. IEEE Int. Workshop on Inform. Forensics and Security (WIFS), Foz do Iguacu, Bra-zil, Nov. 29–Dec. 2, 2011.
XIV.W. J. Scheirer and T. E. Boult, “Cracking fuzzy vaults and biometric encryp-tion,” in Proc. Biometrics Symp., Sep. 2007, pp. 34–39.
View Download

Protein sequence comparison under a new complex representation of amino acids based on their physio-chemical properties

Authors:

Jayanta Pal, Soumen Ghosh, Bansibadan Maji , Dilip Kumar Bhattacharya

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00043

Abstract:

The paper first considers a new complex representation of amino acids of which the real parts and imaginary parts are taken respectively from hydrophilic properties and residue volumes of amino acids. Then it applies complex Fourier transform on the represented sequence of complex numbers to obtain the spectrum in the frequency domain. By using the method of ‘Inter coefficient distances’ on the spectrum obtained, it constructs phylogenetic trees of different Protein sequences. Finally on the basis of such phylogenetic trees pair wise comparison is made for such Protein sequences. The paper also obtains pair wise comparison of the same protein sequences following the same method but based on a known complex representation of amino acids, where the real and imaginary parts refer to hydrophobicity properties and residue volumes of the amino acids respectively. The results of the two methods are now compared with those of the same sequences obtained earlier by other methods. It is found that both the methods are workable, further the new complex representation is better compared to the earlier one. This shows that the hydrophilic property (polarity) is a better choice than hydrophobic property of amino acids especially in protein sequence comparison.

Keywords:

omplex Representatio, DFT, Hydrophobicity Proper,Hydrophilicity (Polarity) Property,ICD; Phylogenetic Tree,Voss Representation,

Refference:

I.K. Brodzik, and 0. Peters, “Symbol-balanced quaternionic periodicity transform for latent pattern detection in DNA sequences,”in Proc. IEEE ICASSP, vol. 5, pp. 373-376, 2005.
II.B. D. Silverman, and R. Linsker, “A measure of DNA periodicity,” J. Theor. Biol., vol. 118, pp. 295-300, 1986.
III.Changchuan Yin and Stephen S. –T. Yau, Numerical representation of DNA sequences Based on Genetic Code Context and its applications in Periodicity Analysis Genomes- 978-1—1779-7/08/$25.00@2008 IEEE
IV.D. Anastassiou, Frequency-domain analysis of bimolecular sequences, Bioinformatics, vol.16, no.4, pp. 1073-1081, 2000.
V.D. Anastassiou, “Genomic signal processing,” IEEE Signal Proc.Mag., vol. 18, no. 4, pp. 8-20, July 2001.
VI.D. E. Godsack and R. C. Chalifoux, Contribution of the free energy of mixing hydrophobic side chains to the stability of the tertiary structure, Journal of Theoretical Biology vol. 39, pp. 645-651, 1973.
VII.Ghosh, S., Pal, J. S. Das and Bhattacharya, D.K (2015)-Biological and Theoretical Classifications of Amino Acids in Six Groups. International Journal of Computer Science and Software Engineering, 5, 695-698.
VIII.Ghosh, S., Pal, J. and Bhattacharya, D.K. (2014) Classification of Amino Acids of a Protein on the Basis of Fuzzy Set Theory. International Journal of Modern Sciences and Engineering Technology, 1, 30-35.
IX.G. L. Rosen, “Signal processing for biologically-inspired gradient source localization and DNA sequence analysis,” PhD thesis, Georgia Institute of Technology, Aug. 2006.
X.J. Ning, C. N. Moore, and J. C. Nelson, “Preliminary wavelet analysis of genomic sequences,” in Proc. IEEE Bioinformatics Conf (CSB), pp. 509-510, August 2003.
XI.King, B.R., Aburdene, M., Thompson, A. and Warres, Z. (2014) Application of Discrete Fourier Inter-Coefficient Difference for Assessing Genetic Sequence Similarity.EURASIP Journal on Bioinformatics and
Systems Biology, 2014, 8.
XII.M. Elloumi et al. (Eds.) “Complex Representation of DNA Sequences by Carlo Cattani”, BIRD 2008, CCIS 13, pp. 528–537, 2008._c Springer- Verlag Berlin Heidelberg 2008.
XIII.N. Chakravarthy, A. Spanias, L. D. lasemidis, and K. Tsakalis,”Autoregressive modeling and feature analysis of DNA sequences,”EURASIP JASP, vol. 1, pp. 13-28, 2004.

XIV.Pal, J., Ghosh, S., Maji, B. and Bhattacharya, D.K. (2016) Use of FFT in Protein Sequence Comparison under Their Binary Representations.Computational Molecular Bioscience, 6, 33-40.http://dx.doi.org/10.4236/cmb.2016.62003
IV.P. Argos, J.K.M.Rao and P.A.Hargrave, structural prediction of membrane bound proteins, Eur.J.Biochevol.128, pp. 565-575,1982.
XVI.P. D. Cristea, “Genetic signal representation and analysis,” in Proc. SPIE Conference, International Biomedical Optics Symposium (BIOS’02), vol.4623, pp. 77-84, 2002.
XVII.R. F. Voss, “Evolution of long-range fractal correlations and 1/f noise in DNA base sequences,” Phy. Rev. Lett., vol. 68, no. 25, pp. 3805-3808,June 1992
XVIII.R. Zhang, and C. T. Zhang, “Z curves, an intuitive tool for visualizing and analyzing the DNA sequences,” J. Biomol. Struct. Dyn.,vol. 11, no. 4, pp. 767-782, February 1994.
XIX.Tung Hoang, Changchuan Yin, Hui Zheng, Chenglong YU, Rong Lucy He, Stephen S, T. Tay – A new method to cluster DNA sequences using Fourier power spectrum- Journal of Theoretical Biology- 372 (2015), 135-145.
View Download

Effect of Thin Layer on Bearing Capacity in Layered Profile Soil

Authors:

Abdul Farhan, Farman Ullah, Fawad Ahmad, Mehr E Munir

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00044

Abstract:

Bearing capacity is the main criteria for designing the foundation of a structure. Several theories and experimental methods have been propounded by many researchers for computing the bearing capacity parameters separately. Traditional bearing capacity theories for determining the ultimate bearing capacity of shallow foundations assume that the bearing stratum is homogenous and infinite. However this is not true in all cases. Layered soils are mostly encountered in practice. It is possible to encounter a rigid layer at shallow depth or the soil may be layered and have different shear strength parameters. In such cases shear pattern gets distorted and bearing capacity becomes dependent on the extent of the rupture surface in weaker or stronger material. The best estimation of bearing capacity on layered soil are possible only, if the pressure-settlement characteristics of the foundation-soil are known for the size of the footing. From the review of literature, it may be noted that the bearing capacity equations proposed for the homogenous soils by Terzaghi (1943) and Meyerhof (1951) are not applicable to layered soils. Hence it is necessary to develop an equation for predicting the bearing capacity of granular layered soils. In present investigation, plate load test have been conducted in a large tank to observe the load settlement behavior of plates of different sizes resting on layered granular soils. Tests were conducted on two layers of soils. Fine gravel layer overlain sand layer were tested using mild steel plates of square shapes. The effect of the placement of layers on the bearing capacity characteristics of footing, has been studied and an equation for predicting the bearing capacity of two layered granular soils is developed based on the plate load test data.

Keywords:

Bearing capacity,plate load test,

Refference:

I.Hanna A. M. Bearing Capacity of Foundations on a Weak Sand Layer Overlaying a Strong Deposit, Canadian Geotechnical Journal, 1982: 392-396.
II.Hanna, A.M., and Meyerhof G.G. (1980), “Design charts for ultimate bearing capacity of foundations on sand overlying soft clay”. Can. Geotech.J, 17(2). 300-303.
III.Meyerhof, G. G. Hanna A. M. Design Charts for Ultimate Bearing Capacity of Foundations on Sand Overlaying Soft Clay. Canadian Geotechnical Journal, 1980, 17: 300-303.
IV.Michalowski, R.L. (1997). An estimate of the influence of soil weight on bearing Capacity using limit analysis. Soils and Foundations, Vol. 37, No.4, pp. 57-64.
V.Meyerhof, G. G. & Hanna, A. M. (1978), ultimate bearing capacity of foundations on layered soils under inclined load. Canadian Geotechnical Journal, vol. 15, n. 4, pp. 565-572.
VI.Srivastava, A.K. (1982), Relevance of small scale model tests for estimating load settlement behavior of footings on sand.” M.Tech dissertation.
VII.Terzaghi, k. and Peck, R. B. (1967) Soil Mechanics in Engineering Practice, 2nd edition John Wiley and Sons Inc, New York, USA.
VIII.Valsangkar A. J, Meyerhof, G. G. Experimental Study of Punching Coefficients and Shape Factor for Two Layered Soils. Canadian Geotechnical Journal, 1979, 16: 802-805.
IX.Varghese P.C., A text Book of Foundation Engineering, Prentice Hall of India Pvt. Ltd., New Delhi, Edition 2005
View Download

Bin the Case Bifurcation and Chaos of Logistic Maps with Three Parameters and its Applications

Authors:

Asia Ali Mohammed, Assistant Prof. Radhi A. Zaboon

DOI NO:

https://doi.org/10.26782/jmcms.2019.06.00045

Abstract:

In this paper, the generalization of logistic discrete dynamic systems with three parameters have been analyzed with the necessary mathematical requirements and proofs. The dynamics and the qualitative properties of the fixed points and their stability, the bin the case bifurcation diagram and chaos have proposed with application.

Keywords:

fixed point ,stability,bin the case bifurcation diagram,periodic point,

Refference:

I.A. Ferrettia, N. K. Rahman , “A study of Coupled Logistic Map and Its Applications in Chemical Pysics” , Chemical Pysics,vol.119 , no.2-3, pp: 275-288,1988.
II.C.Robiason, “Dynamical System. Stability , Symbolic Dynamics and Chaos “, second edition ,CRC Press Boca Ration.Florida,1999.
III.C. Pellicer –Lostao , R. Lpez – Ruiz,”A Chaotic gas- like Model for Trading Markets “,Journal of Computational Science,vol.1, no.1, pp: 24- 32,2010.
IV.D.Gulick, ” Encounters with Chaos “, McGraw Hill, 1990.
V.F .G. Alvarez, Monotoya, G. Pastor, and M. Romera,” Chaotic cryptosystems”, In Proceedings of IEEE International Carnahan Conference on Security Technology, pp: 332-338, 1999.
VI.G.Geoffrey . ,”Chaotic Dynamics; Fractals, Tilings and Substitutions”,Towson University Mathematics Department, 2015.
VII.G. Jakimoski, and L. Kocarev, “Chaos and cryptography: Block encryption ciphers based on chaotic maps “, IEEE Transactionson Circuits and Systems-I: Fundamental Theory and Applications, vol. 48, no.2,
pp:163-169, 2001.
VIII.G. R.Ahmed ,”On Some Generalized Discrete Logistic Maps” , Journal of Advance Research , vol.4, no.2, pp:163-171,2013.
IX.H. R.Biswas, “One Dimensional Chaotic Dynamical Systems “, Journal of Pure and Applied Mathematics :Advance andApplications , Vol. 10, no.0, pp: 69-101, 2013.
X.I.Sajid ,R.Muhammad ,I.Shahaid ,O.Muhammad , A. S.Hadeed,”Study of Nonlinear Dynamics Using Logistic Map”, LUMS 2nd International Conference on Mathematics and its Applications in Information Technology (LICM08), 2008.
XI.K. Pareeka .N.VinodPatidara ,K . K. Sud ,” Image Encryption Using Chaotic Logistic Map ” ,Image and Vision Computing , vol. 24, no.9, pp: 926-934,2006.
XII.M. SBaptista, ” Cryptography with chaos”, Physics Letters A. Vol. 240, no.1-2, pp: 50-54, 1998.
XIII.R.Klages ,” Applied Dynamical System”, Lectures 5-10 From Deterministic Chaos to Deterministic Din the case offusion, Rainer Klages, QMUL,2010
XIV.R.A.J.Matthews ” On the Derivation of a Chaotic Encryption Algorithm”. Cryptologia, vol.13, no.1, pp: 29-42, 1989.
XV.R. L. Devaney, L. Keen ,”Chaos and Fractals :The Mathematics Behind The Computer Graphics “, American Mathematical Society ,Providence, 1989.
XVI.R. Rak, E. Rak ,” Route to Chaos in Generalized Logistic Map” , Faculty of Mathematics and Natural Science ,University of Rezesow , PL-35-45, Rezesow ,Poland ,2015.
XVII.S. Sternberg. “The Perron-Frobenius Theorem”, Dynamical Systems, pp: 175-195, 2011.
XVIII.T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, “A secret key cryptosystem by iterating a chaotic map”, Advances in Cryptology:Proceedings of EUROCRYPT 91, LNCS 547, Berlin:Springer-Verlag, pp: 127-140, 1991.
XIX.T. –Y. Li and J .York ” Period Three Implies Chaos ” , American Mathematical Monthly, vol.82, no.10, pp: 985-992,1975.
XX.W .Xiangjun ,Haibin K. , Jürgen K. , ” A New Color Image Encryption Scheme Based on DNA Sequences and Multiple Improved 1D Chaotic Maps ” , Contents lists available at Science Direct Applied Soft
Computing journal homepage : www.elsevier.com/locate/asoc,2015.
XXI.Z. Kotulski, and J. Szczepanski, ” Discrete chaotic cryptography”, Annalen der Physik, vol. 509, no.5, pp: 381-394, 1997.
XXII.Z. L. Zhou ,” Symbolic Dynamics (chinsi)” , Shanghai Scientin the case ofic and Technology Education Publish House Shanghai, 1997.
View Download