This document summarizes a research paper that proposes combining the Scaled Manhattan Distance method and Mean of Horner's Rules (MHR) for keystroke dynamic authentication. The researchers argue that using averages for classification in keystroke dynamic authentication is not suitable because typing speed can change over time. MHR is proposed instead because it can adapt to changes in values over time. The researchers test their proposed combination method on a dataset of keystroke data from 51 users typing the password "tie5Roanl". Their initial results did not show improved accuracy over the previous method, but modifying the method with a coefficient of 5 yielded much better accuracy, balanced FAR and FRR values compared to other coefficient values tested.
This document discusses reference thresholds in biometric authentication systems. It explains that reference thresholds are used to determine if a person is genuine or an imposter based on comparing a biometric sample to a stored template. The selection of an optimal reference threshold value is important because it affects the false acceptance rate (FAR) and false rejection rate (FRR). The document also outlines factors that can influence FAR, FRR, and the reference threshold, such as biometric quality. It then provides mathematical definitions of reference thresholds, FAR, and FRR, and explains how they are calculated in practice using an example of palm print authentication.
Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in
the form of a logical proof. This paper proposes a new method of security evaluation that produces a
quantitative result. The evaluation is done by analyzing the protocol in the scheme using the Markov chain
technique. This method calculates the probability of an attack that could be executed perfectly in the
scheme’s protocol. As proof of the effectiveness of our evaluation method, we evaluated the security of
Chaum’s untraceable electronic cash scheme. The result of our evaluation was compared to the evaluation
result from the pi-calculus method. Both methods produced comparable results; and thus, both could be
used as alternative methods for evaluating e-cash security.
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources. In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network (BPNN),Hopfield Neural
Network(HPNN),Bidirectional Associative Memories(BAM),Brain-State-in-a Box(BSB). Later Password authentication has been provided using Context-Sensitive Associative Memory Method (CSAM). Here in this paper we proposed performance analysis of password authentication schemes using Associative memories and CSAM using graphical Images. We observe that in comparison to existing layered and associative neural network techniques for graphical images as password, the CSAM method provides better accuracy and quicker response time to registration and password changes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
IRJET- Survey on Credit Card Security System for Bank Transaction using N...IRJET Journal
This document summarizes a research paper that proposes a credit card fraud detection system using machine learning algorithms like Naive Bayes and Random Forest. It begins with an abstract describing the use of these classification algorithms on credit card transaction data to model past transactions and identify fraudulent ones. Then, it provides background on the increasing problem of credit card fraud and motivates the need for this research. It describes the Naive Bayes and Random Forest algorithms and evaluates their performance on this fraud detection task. Finally, it reviews related work applying machine learning to credit card fraud detection and discusses the results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
The document describes a fake news detection system called "FAKEBUSTER" that was developed using logistic regression in machine learning. It analyzed past research that found logistic regression achieved 79-89% accuracy in detecting fake news. The system was trained on a dataset of news articles labeled as real or fake. It uses TF-IDF to convert text to numerical features for the logistic regression model. The model was integrated into a web application called "FAKEBUSTER" that allows users to input a news article or URL to check if it is real or fake. Evaluation found the stance detection approach improved the model's accuracy for fake news classification.
This document discusses reference thresholds in biometric authentication systems. It explains that reference thresholds are used to determine if a person is genuine or an imposter based on comparing a biometric sample to a stored template. The selection of an optimal reference threshold value is important because it affects the false acceptance rate (FAR) and false rejection rate (FRR). The document also outlines factors that can influence FAR, FRR, and the reference threshold, such as biometric quality. It then provides mathematical definitions of reference thresholds, FAR, and FRR, and explains how they are calculated in practice using an example of palm print authentication.
Security evaluations of electronic cash (e-cash) schemes usually produce an abstract result in
the form of a logical proof. This paper proposes a new method of security evaluation that produces a
quantitative result. The evaluation is done by analyzing the protocol in the scheme using the Markov chain
technique. This method calculates the probability of an attack that could be executed perfectly in the
scheme’s protocol. As proof of the effectiveness of our evaluation method, we evaluated the security of
Chaum’s untraceable electronic cash scheme. The result of our evaluation was compared to the evaluation
result from the pi-calculus method. Both methods produced comparable results; and thus, both could be
used as alternative methods for evaluating e-cash security.
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
They are many ways of providing security to user resources. Password authentication is a very important system security procedure to secure user resources. In order to solve the problems with traditional password authentication several methods have been introduced to provide password authentication using Associative Memories like Back Propagation Neural Network (BPNN),Hopfield Neural
Network(HPNN),Bidirectional Associative Memories(BAM),Brain-State-in-a Box(BSB). Later Password authentication has been provided using Context-Sensitive Associative Memory Method (CSAM). Here in this paper we proposed performance analysis of password authentication schemes using Associative memories and CSAM using graphical Images. We observe that in comparison to existing layered and associative neural network techniques for graphical images as password, the CSAM method provides better accuracy and quicker response time to registration and password changes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
USE OF MARKOV CHAIN FOR EARLY DETECTING DDOS ATTACKSIJNSA Journal
DDoS has a variety of types of mixed attacks. Botnet attackers can chain different types of DDoS attacks to confuse cybersecurity defenders. In this article, the attack type can be represented as the state of the model. Considering the attack type, we use this model to calculate the final attack probability. The final attack probability is then converted into one prediction vector, and the incoming attacks can be detected early before IDS issues an alert. The experiment results have shown that the prediction model that can make multi-vector DDoS detection and analysis easier.
IRJET- Survey on Credit Card Security System for Bank Transaction using N...IRJET Journal
This document summarizes a research paper that proposes a credit card fraud detection system using machine learning algorithms like Naive Bayes and Random Forest. It begins with an abstract describing the use of these classification algorithms on credit card transaction data to model past transactions and identify fraudulent ones. Then, it provides background on the increasing problem of credit card fraud and motivates the need for this research. It describes the Naive Bayes and Random Forest algorithms and evaluates their performance on this fraud detection task. Finally, it reviews related work applying machine learning to credit card fraud detection and discusses the results.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
Fakebuster fake news detection system using logistic regression technique i...Conference Papers
The document describes a fake news detection system called "FAKEBUSTER" that was developed using logistic regression in machine learning. It analyzed past research that found logistic regression achieved 79-89% accuracy in detecting fake news. The system was trained on a dataset of news articles labeled as real or fake. It uses TF-IDF to convert text to numerical features for the logistic regression model. The model was integrated into a web application called "FAKEBUSTER" that allows users to input a news article or URL to check if it is real or fake. Evaluation found the stance detection approach improved the model's accuracy for fake news classification.
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...AJSERJournal
The cryptographic systems used in an organization use a fixed cryptographic algorithm and the specific
procedures of that system. Due to the fact that the algorithm is fixed in these systems, the probability of failure or
success of such systems depends on human resources, hardware resources and work environment so that it can be said
that the probability of success or the failure of these systems is 50%. Also, in this kind of systems, there are no other
algorithms based on the needs of the user. This research addresses the question of how we can use multiple
asymmetric algorithms in a cryptographic system that does not defeat the algorithm by the opponent. In this research,
selection of algorithms based on some environmental parameters and the possibility of breaking the algorithm by the
opponent should be selected. This will be done using game theory. The problem is modeled as a model of solvable
problems by game theory and generated outputs will be use by Gambit software which is especial for Game theory. The
results obtained from this study indicate the ease of choosing the algorithm based on the need and with regard to the
attack on the opponent and how to reduce the likelihood of breaking the algorithm
The International Journal of Engineering and Science (The IJES)theijes
This document proposes a new Password Guessing Resistant Protocol (PGRP) to improve the security of password-based authentication against large-scale online attacks while maintaining usability for legitimate users. PGRP limits automated bots to 3 login attempts per username before requiring an Automated Turing Test (ATT), while allowing legitimate users logging in from known devices up to 30 failed attempts without an ATT. PGRP tracks user devices and login patterns to distinguish human and bot behavior. The protocol was tested in several scenarios and was found to effectively prevent password guessing while providing a better user experience compared to existing ATT-based methods.
This document summarizes security definitions for searchable symmetric encryption (SSE) schemes. It reviews the indistinguishability and semantic security game definitions, noting that attacks have succeeded against published schemes. It then proposes a new security game definition against distribution-based query recovery attacks, to better capture practical adversary capabilities. The goal is to define security in a way that implies the current indistinguishability and semantic security definitions.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
This document summarizes a research paper on identifying authorized users based on typing speed comparison. The paper proposes using a user's typing speed and patterns as a behavioral biometric for authentication. It analyzes keystroke dynamics data such as dwell times and flight times between keys. A neural network classifier is used to model users' typing behaviors based on monograph and digraph mappings. The proposed framework achieved reduced false positive and negative rates compared to existing password-based authentication methods. It provides a simple, low-cost way to increase computer security without additional hardware or training for users.
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
The document proposes privacy-preserving algorithms for determining an optimal meeting location for a group of users. It aims to solve this problem, called the Fair Rendezvous Point (FRVP) problem, in a way that protects users' location privacy from both other users and third-party service providers. The algorithms take advantage of homomorphic cryptography to privately compute the optimal location based on users' encrypted location preferences. The document evaluates the privacy and performance of the proposed algorithms through both theoretical analysis and prototype implementation on mobile devices.
This document provides details for the ACC 564 entire online course, including discussion questions, assignments, quizzes and exams for each week. It lists the topics that will be covered each week such as information needs for accounting information systems, attacks on systems, fraud detection, and databases. It also includes 50 multiple choice questions that make up the final exam for the course which covers topics like data flow diagrams, internal controls, risk assessment, and auditing.
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX)
This document describes a new password authentication method that combines textual passwords with a modified cued click points technique for increased security. The method uses a special key display interface that breaks the user's password into a combination of four passwords plus three additional strings. These seven strings are then encrypted using a novel one-way encryption algorithm called One-time Data Division (ODD). This produces a 256-character encrypted password that is stored in the database for authentication. The encryption is complex and lossy, making the original password irrecoverable even by an administrator. The method aims to provide strong security while maintaining usability.
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsHariteja Bodepudi
This document summarizes a research paper that uses unsupervised machine learning algorithms to detect credit card fraud. It describes how credit card fraud has increased with the rise of online shopping and payments. Unsupervised algorithms are well-suited for this task since labeled fraud data can be difficult to obtain. The paper tests Isolation Forest, Local Outlier Factor, and One Class SVM on a credit card transaction dataset to find anomalies (fraudulent transactions). Isolation Forest achieved the highest accuracy at 99.74%, slightly outperforming Local Outlier Factor, while One Class SVM had much lower accuracy. The paper concludes unsupervised algorithms are effective for anomaly detection tasks like credit card fraud detection.
For more course tutorials visit
www.newtonhelp.com
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
This document contains information about computer security and cryptography. It discusses the need for network security, security models including no security, security through obscurity, host security and network security. It also covers key security principles such as confidentiality, authentication, availability, access control, integrity and non-repudiation. Finally, it discusses types of attacks including passive attacks like release of message contents and traffic analysis, and active attacks like masquerade, modification, denial of service, packet sniffing and packet spoofing.
Power analysis attack against encryption devices: a comprehensive analysis of...TELKOMNIKA JOURNAL
1) The document discusses a power analysis attack against encryption devices that analyzes the AES, DES, and BC3 encryption algorithms.
2) The attack implements differential power analysis and correlation power analysis techniques to attempt to recover the secret keys of devices implementing the encryption algorithms.
3) For AES, the attack successfully recovered 100% of the secret key using 500 traces, while for DES it recovered 75% of the key using 320 traces.
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ACC 564 NERD Lessons in Excellence--acc564nerd.comthomashard70
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides instructions for two papers on information needs for an accounting information system and assumptions management makes about AIS. The document also includes details about purchasing the full ACC 564 course from the listed website.
ACC 564 NERD Education for Service--acc564nerd.comRoelofMerwe152
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides details on topics that will be covered such as the value of information, accounting information systems design, information needs, fraud prevention, and systems implementation. Students will complete discussion questions, assignments involving writing papers, and take several quizzes and exams to assess their understanding of accounting information systems concepts over the 10 week course.
FOR MORE CLASSES VISIT
www.acc564nerd.com
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX)
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides details on topics that will be covered such as the value of information, accounting information systems design, information needs, fraud prevention, and systems implementation. Students will complete discussion questions, assignments, and exams to assess their understanding of accounting information systems concepts over the 10 week course.
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...IRJET Journal
The document describes a proposed e-learning system that uses cryptography and data mining techniques to provide security and personalized recommendations. Elliptic curve cryptography is used to authenticate users and encrypt data for security. A decision tree algorithm classifies learner information and course content to recommend additional courses tailored to each learner's interests and behavior. The system aims to address security and privacy issues in e-learning while enhancing the learning experience through targeted content filtering and recommendations.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...IRJET Journal
This document proposes and evaluates a mobile application called "Secret Lock" that integrates app locking and mobile theft detection using user patterns. The application allows users to add apps for secure access and generates authentication questions during registration based on the user's mobile usage history and patterns. If the mobile is stolen, the app activates sensors like the camera, GPS, and voice recorder to take photos, track the location, and record audio of the thief. This data is then sent to the user via SMS and email to identify and track the stolen device. The system architecture uses support vector machines for user identification, GPS for location tracking, and SMS and email for alerting the user if their device is stolen. The application was tested and found to generate
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...AJSERJournal
The cryptographic systems used in an organization use a fixed cryptographic algorithm and the specific
procedures of that system. Due to the fact that the algorithm is fixed in these systems, the probability of failure or
success of such systems depends on human resources, hardware resources and work environment so that it can be said
that the probability of success or the failure of these systems is 50%. Also, in this kind of systems, there are no other
algorithms based on the needs of the user. This research addresses the question of how we can use multiple
asymmetric algorithms in a cryptographic system that does not defeat the algorithm by the opponent. In this research,
selection of algorithms based on some environmental parameters and the possibility of breaking the algorithm by the
opponent should be selected. This will be done using game theory. The problem is modeled as a model of solvable
problems by game theory and generated outputs will be use by Gambit software which is especial for Game theory. The
results obtained from this study indicate the ease of choosing the algorithm based on the need and with regard to the
attack on the opponent and how to reduce the likelihood of breaking the algorithm
The International Journal of Engineering and Science (The IJES)theijes
This document proposes a new Password Guessing Resistant Protocol (PGRP) to improve the security of password-based authentication against large-scale online attacks while maintaining usability for legitimate users. PGRP limits automated bots to 3 login attempts per username before requiring an Automated Turing Test (ATT), while allowing legitimate users logging in from known devices up to 30 failed attempts without an ATT. PGRP tracks user devices and login patterns to distinguish human and bot behavior. The protocol was tested in several scenarios and was found to effectively prevent password guessing while providing a better user experience compared to existing ATT-based methods.
This document summarizes security definitions for searchable symmetric encryption (SSE) schemes. It reviews the indistinguishability and semantic security game definitions, noting that attacks have succeeded against published schemes. It then proposes a new security game definition against distribution-based query recovery attacks, to better capture practical adversary capabilities. The goal is to define security in a way that implies the current indistinguishability and semantic security definitions.
Efficient Facial Expression and Face Recognition using Ranking MethodIJERA Editor
Expression detection is useful as a non-invasive method of lie detection and behaviour prediction. However, these facial expressions may be difficult to detect to the untrained eye. In this paper we implements facial expression recognition techniques using Ranking Method. The human face plays an important role in our social interaction, conveying people's identity. Using human face as a key to security, the biometrics face recognition technology has received significant attention in the past several years. Experiments are performed using standard database like surprise, sad and happiness. The universally accepted three principal emotions to be recognized are: surprise, sad and happiness along with neutral.
This document summarizes a research paper on identifying authorized users based on typing speed comparison. The paper proposes using a user's typing speed and patterns as a behavioral biometric for authentication. It analyzes keystroke dynamics data such as dwell times and flight times between keys. A neural network classifier is used to model users' typing behaviors based on monograph and digraph mappings. The proposed framework achieved reduced false positive and negative rates compared to existing password-based authentication methods. It provides a simple, low-cost way to increase computer security without additional hardware or training for users.
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
The document proposes privacy-preserving algorithms for determining an optimal meeting location for a group of users. It aims to solve this problem, called the Fair Rendezvous Point (FRVP) problem, in a way that protects users' location privacy from both other users and third-party service providers. The algorithms take advantage of homomorphic cryptography to privately compute the optimal location based on users' encrypted location preferences. The document evaluates the privacy and performance of the proposed algorithms through both theoretical analysis and prototype implementation on mobile devices.
This document provides details for the ACC 564 entire online course, including discussion questions, assignments, quizzes and exams for each week. It lists the topics that will be covered each week such as information needs for accounting information systems, attacks on systems, fraud detection, and databases. It also includes 50 multiple choice questions that make up the final exam for the course which covers topics like data flow diagrams, internal controls, risk assessment, and auditing.
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX)
This document describes a new password authentication method that combines textual passwords with a modified cued click points technique for increased security. The method uses a special key display interface that breaks the user's password into a combination of four passwords plus three additional strings. These seven strings are then encrypted using a novel one-way encryption algorithm called One-time Data Division (ODD). This produces a 256-character encrypted password that is stored in the database for authentication. The encryption is complex and lossy, making the original password irrecoverable even by an administrator. The method aims to provide strong security while maintaining usability.
Credit Card Fraud Detection Using Unsupervised Machine Learning AlgorithmsHariteja Bodepudi
This document summarizes a research paper that uses unsupervised machine learning algorithms to detect credit card fraud. It describes how credit card fraud has increased with the rise of online shopping and payments. Unsupervised algorithms are well-suited for this task since labeled fraud data can be difficult to obtain. The paper tests Isolation Forest, Local Outlier Factor, and One Class SVM on a credit card transaction dataset to find anomalies (fraudulent transactions). Isolation Forest achieved the highest accuracy at 99.74%, slightly outperforming Local Outlier Factor, while One Class SVM had much lower accuracy. The paper concludes unsupervised algorithms are effective for anomaly detection tasks like credit card fraud detection.
For more course tutorials visit
www.newtonhelp.com
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
This document contains information about computer security and cryptography. It discusses the need for network security, security models including no security, security through obscurity, host security and network security. It also covers key security principles such as confidentiality, authentication, availability, access control, integrity and non-repudiation. Finally, it discusses types of attacks including passive attacks like release of message contents and traffic analysis, and active attacks like masquerade, modification, denial of service, packet sniffing and packet spoofing.
Power analysis attack against encryption devices: a comprehensive analysis of...TELKOMNIKA JOURNAL
1) The document discusses a power analysis attack against encryption devices that analyzes the AES, DES, and BC3 encryption algorithms.
2) The attack implements differential power analysis and correlation power analysis techniques to attempt to recover the secret keys of devices implementing the encryption algorithms.
3) For AES, the attack successfully recovered 100% of the secret key using 500 traces, while for DES it recovered 75% of the key using 320 traces.
SPECIFICATION BASED TESTING OF ON ANDROID SYSTEMSijwmn
With the surging of mobile applications, mobile security draws more and more attentions from researchers
in various areas. Due to the lack of quality assurance approaches in mobile computing, many mobile
applications suffer the vulnerabilities and security flaws. In this paper, we proposed a model based unit
testing approach on the android security properties using JUnit. Both behavior and structure model of the
android application were developed on the Unified Modeling Language (UML) – behavior is described in
state diagram, while structure is described in class diagram. Our approach focus on two common security
groups – the access control and authentication properties. Both groups are represented in the operations
defined in the class diagrams and dynamic behaviors are captured (partially) in the state diagram. A set of
well defined test cases is developed to validate the desired properties based on the class diagram. All
properties on the class diagram and state diagram are described in Object Constraint Language (OCL) – a
formal specification language on the first order logic and set theory.The results of this research will
provide a sound foundation towards the specification based unit testing on mobile security.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
ACC 564 NERD Lessons in Excellence--acc564nerd.comthomashard70
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides instructions for two papers on information needs for an accounting information system and assumptions management makes about AIS. The document also includes details about purchasing the full ACC 564 course from the listed website.
ACC 564 NERD Education for Service--acc564nerd.comRoelofMerwe152
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides details on topics that will be covered such as the value of information, accounting information systems design, information needs, fraud prevention, and systems implementation. Students will complete discussion questions, assignments involving writing papers, and take several quizzes and exams to assess their understanding of accounting information systems concepts over the 10 week course.
FOR MORE CLASSES VISIT
www.acc564nerd.com
Please check the details below
ACC 564 Week 1 DQ 1 Value of Information and DQ 2 AIS
ACC 564 Week 2 DQ 1 Evaluation of Documentation Tools and DQ 2 David Miller
ACC 564 Week 2 Assignment 1 Information Needs for the AIS (2 Papers)
ACC 564 Week 3 DQ 1 Attacks and DQ 2 Revamping the Sarbanes-Oxley Act (SOX)
This document outlines the course content for ACC 564, including discussion questions, assignments, quizzes and exams for each week. It provides details on topics that will be covered such as the value of information, accounting information systems design, information needs, fraud prevention, and systems implementation. Students will complete discussion questions, assignments, and exams to assess their understanding of accounting information systems concepts over the 10 week course.
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...IRJET Journal
The document describes a proposed e-learning system that uses cryptography and data mining techniques to provide security and personalized recommendations. Elliptic curve cryptography is used to authenticate users and encrypt data for security. A decision tree algorithm classifies learner information and course content to recommend additional courses tailored to each learner's interests and behavior. The system aims to address security and privacy issues in e-learning while enhancing the learning experience through targeted content filtering and recommendations.
An intrusion detection algorithm for amiIJCI JOURNAL
Nowadays, using the smart metering devices for energy users to manage a wide variety of subscribers,
reading devices for measuring, billing, disconnection and connection of subscribers’ connection
management is an important issue. The performance of these intelligent systems is based on information
transfer in the context of information technology, so reported data from network should be managed to
avoid the malicious activities that including the issues that could affect the quality of service the system. In
this paper for control of the reported data and to ensure the veracity of the obtained information, using
intrusion detection system is proposed based on the support vector machine and principle component
analysis (PCA) to recognize and identify the intrusions and attacks in the smart grid. Here, the operation of
intrusion detection systems for different kernel of SVM when using support vector machine (SVM) and PCA
simultaneously is studied. To evaluate the algorithm, based on data KDD99, numerical simulation is done
on five different kernels for an intrusion detection system using support vector machine with PCA
simultaneously. Also comparison analysis is investigated for presented intrusion detection algorithm in
terms of time - response, rate of increase network efficiency and increase system error and differences in
the use or lack of use PCA. The results indicate that correct detection rate and the rate of attack error
detection have best value when PCA is used, and when the core of algorithm is radial type, in SVM
algorithm reduces the time for data analysis and enhances performance of intrusion detection.
Secret Lock – Anti Theft: Integration of App Locker & Detection of Theft Usin...IRJET Journal
This document proposes and evaluates a mobile application called "Secret Lock" that integrates app locking and mobile theft detection using user patterns. The application allows users to add apps for secure access and generates authentication questions during registration based on the user's mobile usage history and patterns. If the mobile is stolen, the app activates sensors like the camera, GPS, and voice recorder to take photos, track the location, and record audio of the thief. This data is then sent to the user via SMS and email to identify and track the stolen device. The system architecture uses support vector machines for user identification, GPS for location tracking, and SMS and email for alerting the user if their device is stolen. The application was tested and found to generate
DDSGA: A Data-Driven Semi-Global Alignment Approach for Detecting Masquerade ...1crore projects
IEEE PROJECTS 2015
1 crore projects is a leading Guide for ieee Projects and real time projects Works Provider.
It has been provided Lot of Guidance for Thousands of Students & made them more beneficial in all Technology Training.
Dot Net
DOTNET Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
Java Project Domain list 2015
1. IEEE based on datamining and knowledge engineering
2. IEEE based on mobile computing
3. IEEE based on networking
4. IEEE based on Image processing
5. IEEE based on Multimedia
6. IEEE based on Network security
7. IEEE based on parallel and distributed systems
ECE IEEE Projects 2015
1. Matlab project
2. Ns2 project
3. Embedded project
4. Robotics project
Eligibility
Final Year students of
1. BSc (C.S)
2. BCA/B.E(C.S)
3. B.Tech IT
4. BE (C.S)
5. MSc (C.S)
6. MSc (IT)
7. MCA
8. MS (IT)
9. ME(ALL)
10. BE(ECE)(EEE)(E&I)
TECHNOLOGY USED AND FOR TRAINING IN
1. DOT NET
2. C sharp
3. ASP
4. VB
5. SQL SERVER
6. JAVA
7. J2EE
8. STRINGS
9. ORACLE
10. VB dotNET
11. EMBEDDED
12. MAT LAB
13. LAB VIEW
14. Multi Sim
CONTACT US
1 CRORE PROJECTS
Door No: 214/215,2nd Floor,
No. 172, Raahat Plaza, (Shopping Mall) ,Arcot Road, Vadapalani, Chennai,
Tamin Nadu, INDIA - 600 026
Email id: 1croreprojects@gmail.com
website:1croreprojects.com
Phone : +91 97518 00789 / +91 72999 51536
User identification based on short text using recurrent deep learningIAESIJAI
Technological development is a revolutionary process by this time, it is mainly depending on electronic applications in our daily routines like (business management, banking, financial transfers, health, and other essential traits of life). Identification or approving identity is one of the complicated issues within online electronic applications. Person’s writing style can be employed as an identifying biological characteristic in order to recognize the identity. This paper presents a new way for identifying a person in a social media group using comments and based on the Deep Neural Network. The text samples are short text comments collected from Telegram group in Arabic language (Iraqi dialect). The proposed model is able to extract the person's writing style features in group comments based on pre-saved dataset. The analysis of this information and features forms the identification decision. This model exhibits a range of prolific and favorable results, the accuracy that comes with the proposed system reach to 92.88% (+/-0.16%).
Intrusion Detection System Using Machine Learning: An OverviewIRJET Journal
This document provides an overview of machine learning approaches for intrusion detection systems (IDS). It discusses how IDS use data mining techniques like classification, clustering, and association rule mining to detect network intrusions based on patterns in data. The document reviews several papers applying methods like ant colony optimization, support vector machines, genetic algorithms, and convolutional neural networks to classify network activities as normal or intrusive. It compares the strengths and limitations of different machine learning algorithms for IDS and identifies areas for potential improvement in future research.
TEXTUAL passwords have been the most widely used authentication method for decades. Comprised of number sand upper- and lower-case letters, textual passwords are considered strong enough to resist against brute force
attacks. However, a strong textual password is hard to memorize and recollect .Therefore, users tend to choose passwords that are either short or from the dictionary, rather than random alphanumeric strings.
Various graphical password authentication schemes
were developed to address the problems and weaknesses associated with textual passwords. Based on some studies such as those in , humans have a better ability to memorize images with long-term memory(LTM) than verbal representations. Image-based passwords were proved to be easier to recollect in several user studies As a result, users can set up a complex authentication password and are capable of recollecting it after a long time even if the memory is not activated periodically.
The human actions such as choosing bad passwords for
new accounts and inputting passwords in an insecure way for later logins are regarded as the weakest link in the authentication chain [16]. Therefore, an authentication scheme should be designed to overcome these vulnerabilities.
In this paper, we present a secure graphical authentication system named Pass Matrix that protects users from becoming victims of shoulder surfing attacks when inputting passwords in public through the usage of one-time login indicators. A login indicator is randomly generated for each pass-image and will be useless after the session terminates. The login indicator provides better security against shoulder surfing attacks, since users use a dynamic pointer to point out the position of their passwords rather than clicking on
the password object directly.
A mathematical model of access control in big data using confidence interval ...csandit
Nowadays, the concept of big data grows incessantly
; recent researches proved that 90% of the
whole data existed on the web had been created in l
ast two years. However, this growing
bumped by many critical challenges resides generall
y in security level; the users care about
how could providers protect their privacy on their
data. Access control, cryptography, and de-
identification are the main search areas grouped un
der a specific domain known as Privacy
Preserving Data Publishing. In this paper, we bring
in suggestion a new model for access
control over big data using digital signature and c
onfidence interval; we first introduce our
work by presenting some general concepts used to bu
ild our approach then presenting the idea
of this report and finally we evaluate our system b
y conducting several experiments and
showing and discussing the results that we got
A MATHEMATICAL MODEL OF ACCESS CONTROL IN BIG DATA USING CONFIDENCE INTERVAL ...cscpconf
- The document proposes a new model for access control over big data using digital signatures and confidence intervals. It involves a multi-step process of 1) identifying users hierarchically, 2) normalizing identities, 3) computing confidence intervals for each group, 4) computing digital signatures for each user, and 5) defining an access control matrix based on these computations.
- The model utilizes mathematical concepts such as standard deviation, confidence intervals, and primitive roots. Standard deviations are used to compute confidence intervals for each group's identity range. Primitive roots are used to uniquely generate digital signatures for each user.
- The goal is to provide access control while preserving user privacy over large datasets where direct control is lost, by bas
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
This document summarizes a research paper that proposes a secure approach for intruder detection using backtracking. The approach detects intruders by analyzing network traffic and matching it to known attack patterns. If an abnormal behavior or attack is identified, an alert is sent to the administrator. When messages are sent between nodes, the receiver uses backtracking to check the transaction history and identify any differences in node keys that could indicate an intruder. This helps track down the intruder by analyzing previous transactions in the network.
Biometrics technologies are gaining popularity because they provide more reliable and secure means in the process of authentication and verification of users. Dynamic typing is a kind of behavioral biometrics which uses different methods and techniques to store and analyze the users own way of typing. This paper presents a user authentication methodology using keystroke dynamics through piezo-resistive force sensors. An authentication system has been created checking the total typing time, the typing time between each key typed, the force of key typing and the average typing force. The system checks the user authentication veracity in the act of registration. A common numeric keypad modified with piezo-resistive sensors along with a microcontroller were used as materials. The methodology also uses a statistical classifier for the evaluation of users, a data filter to evaluate samples and a method for determining the individual thresholds of users. The system presented biometric error rates of 7.91% of FRR (false rejection rate), 2.32% of FAR (false acceptance rate) and 4.72% of EER (equal error rate).
Vulnerabilities detection using attack recognition technique in multi-factor ...TELKOMNIKA JOURNAL
Authentication is one of the essentials components of information security. It has become one of the most basic security requirements for network communication. Today, there is a necessity for a strong level of authentication to guarantee a significant level of security is being conveyed to the application. As such, it expedites challenging issues on security and efficiency. Security issues such as privacy and data integrity emerge because of the absence of control and authority. In addition, the bigger issue for multi-factor authentication is on the high execution time that leads to overall performance degradation. Most of existing studies related to multi-factor authentication schemes does not detect weaknesses based on user behavior. Most recent research does not look at the efficiency of the system by focusing only on improving the security aspect of authentication. Hence, this research proposes a new multi-factor authentication scheme that can withstand attacks, based on user behavior and maintaining optimum efficiency. Experiments have been conducted to evaluate this scheme. The results of the experiment show that the processing time of the proposed scheme is lower than the processing time of other schemes. This is particularly important after additional security features have been added to the scheme.
Analysis on Fraud Detection Mechanisms Using Machine Learning TechniquesIRJET Journal
1) The document discusses using machine learning techniques like Random Forest Classifier and AdaBoost to detect fraud in blockchain transactions through an ensemble model.
2) It analyzes the individual accuracy of Random Forest and AdaBoost classifiers, finding accuracies over 99.99%, then ensembles their predictions using a stacking method.
3) The stacking ensemble model combines the predictions of the Random Forest and AdaBoost models into a new training set to potentially provide even more accurate fraud detection compared to the individual models.
IRJET- Error Reduction in Data Prediction using Least Square Regression MethodIRJET Journal
This document proposes a modification to the least squares regression method to reduce errors in data prediction. It divides the original data set into three parts, uses the first part to make predictions with least squares regression and fits those predictions to the second part of the data to minimize errors. It then validates the model on the third part of data and compares errors to the original least squares method. The proposed method shows reduced errors in prediction based on mean absolute error, mean relative error and root mean square error metrics in most test ranges of the validation data.
BITCOIN HEIST: RANSOMWARE ATTACKS PREDICTION USING DATA SCIENCEIRJET Journal
This document discusses using machine learning techniques to predict ransomware attacks. It begins by providing background on ransomware, data science, and machine learning. It then describes building a model using various machine learning algorithms like logistic regression, random forest, H-LICKS, and voting classifier on preprocessed ransomware data. The random forest algorithm achieved the highest accuracy of 90.5%. The model can classify six types of ransomware attacks with 97% accuracy, which is 3x faster than other models. This accurate and fast ransomware prediction model could help organizations detect and prevent attacks. Overall, applying advanced machine learning represents progress in combating the growing threat of ransomware.
A SURVEY ON MULTIMODAL BIOMETRIC AUTHENTICATION SYSTEM IN CLOUD COMPUTINGpharmaindexing
This document discusses a survey on multimodal biometric authentication systems in cloud computing. It begins with introducing the authors and purpose of studying multimodal biometrics. It then discusses how combining multiple biometric modalities can improve authentication by reducing errors. The document reviews different biometric traits like fingerprints, iris scans, and behavioral patterns. It also covers challenges of single biometric systems and how fusing modalities can help. The goal is to provide more secure authentication as a cloud service using multimodal biometrics.
A new proactive feature selection model based on the enhanced optimization a...IJECEIAES
This document presents a new proactive feature selection (PFS) model to detect distributed reflection denial of service (DRDoS) attacks using an optimized feature selection approach. The PFS model uses swarm optimization and evolutionary algorithms like particle swarm optimization, bat algorithm, and differential evolution to select optimal features. It then evaluates selected features using machine learning classifiers like k-nearest neighbors, support vector machine, and random forest. The model was tested on the CICDDoS2019 dataset and achieved a high DRDoS detection accuracy of 89.59% while reducing the number of features. Evaluation metrics like accuracy, precision, recall and F1-score were also improved compared to previous models. The PFS model provides an effective approach
This document presents a proposed churn prediction model based on data mining techniques. The model involves 6 steps: identifying the problem domain, data selection, data investigation, classification, clustering, and knowledge usage. The model is tested on a dataset from a mobile service provider containing 5000 instances with 23 attributes. Decision tree, neural network, and support vector machine techniques are used for classification. SVM achieved the best results, predicting 421 churners with 84.2% accuracy. These predicted churners are then clustered into 3 groups using k-means clustering. The clusters may be used for retention strategies based on profitability, priority, or dissatisfaction levels.
IRJET- Prediction of Crime Rate Analysis using Supervised Classification Mach...IRJET Journal
This document presents a study that uses machine learning techniques to predict crime rates. Specifically, it aims to analyze crime data using supervised machine learning classification algorithms like decision trees, support vector machines, logistic regression, k-nearest neighbors, and random forests. The document outlines collecting and preprocessing crime data, selecting relevant features, training models on a portion of the data and testing them on the remaining data. It finds that random forest achieved the best prediction accuracy compared to other algorithms tested. The goal is to help law enforcement agencies better predict and reduce crime rates by analyzing historical crime data patterns.
CREDIT CARD FRAUD DETECTION AND AUTHENTICATION SYSTEM USING MACHINE LEARNINGIRJET Journal
This document discusses developing a machine learning-based credit card fraud detection and authentication system. It aims to identify fraudulent transactions and authenticate users before transactions are completed. The system will use algorithms like decision trees, random forests, and KNN to analyze transaction data and detect suspicious activity by training on past fraud data. It will also implement authentication methods like face recognition and one-time passwords. The system is expected to increase credit card transaction security and prevent fraud by detecting and authenticating issues before they occur, saving consumers and financial institutions money.
In Banking Loan Approval Prediction Using Machine LearningIRJET Journal
This document discusses using machine learning algorithms to predict loan approvals. It analyzes loan data using decision trees, logistic regression, and random forest algorithms. The random forest algorithm achieved the highest accuracy rate of 88.53% compared to 85% for decision trees and 83.04% for logistic regression. Therefore, the random forest algorithm is concluded to be best for loan approval prediction. Future work could involve applying these algorithms to other loan data sets and exploring additional machine learning methods.
Similar to Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
TIME DIVISION MULTIPLEXING TECHNIQUE FOR COMMUNICATION SYSTEMHODECEDSIET
Time Division Multiplexing (TDM) is a method of transmitting multiple signals over a single communication channel by dividing the signal into many segments, each having a very short duration of time. These time slots are then allocated to different data streams, allowing multiple signals to share the same transmission medium efficiently. TDM is widely used in telecommunications and data communication systems.
### How TDM Works
1. **Time Slots Allocation**: The core principle of TDM is to assign distinct time slots to each signal. During each time slot, the respective signal is transmitted, and then the process repeats cyclically. For example, if there are four signals to be transmitted, the TDM cycle will divide time into four slots, each assigned to one signal.
2. **Synchronization**: Synchronization is crucial in TDM systems to ensure that the signals are correctly aligned with their respective time slots. Both the transmitter and receiver must be synchronized to avoid any overlap or loss of data. This synchronization is typically maintained by a clock signal that ensures time slots are accurately aligned.
3. **Frame Structure**: TDM data is organized into frames, where each frame consists of a set of time slots. Each frame is repeated at regular intervals, ensuring continuous transmission of data streams. The frame structure helps in managing the data streams and maintaining the synchronization between the transmitter and receiver.
4. **Multiplexer and Demultiplexer**: At the transmitting end, a multiplexer combines multiple input signals into a single composite signal by assigning each signal to a specific time slot. At the receiving end, a demultiplexer separates the composite signal back into individual signals based on their respective time slots.
### Types of TDM
1. **Synchronous TDM**: In synchronous TDM, time slots are pre-assigned to each signal, regardless of whether the signal has data to transmit or not. This can lead to inefficiencies if some time slots remain empty due to the absence of data.
2. **Asynchronous TDM (or Statistical TDM)**: Asynchronous TDM addresses the inefficiencies of synchronous TDM by allocating time slots dynamically based on the presence of data. Time slots are assigned only when there is data to transmit, which optimizes the use of the communication channel.
### Applications of TDM
- **Telecommunications**: TDM is extensively used in telecommunication systems, such as in T1 and E1 lines, where multiple telephone calls are transmitted over a single line by assigning each call to a specific time slot.
- **Digital Audio and Video Broadcasting**: TDM is used in broadcasting systems to transmit multiple audio or video streams over a single channel, ensuring efficient use of bandwidth.
- **Computer Networks**: TDM is used in network protocols and systems to manage the transmission of data from multiple sources over a single network medium.
### Advantages of TDM
- **Efficient Use of Bandwidth**: TDM all
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
Comparative analysis between traditional aquaponics and reconstructed aquapon...bijceesjournal
The aquaponic system of planting is a method that does not require soil usage. It is a method that only needs water, fish, lava rocks (a substitute for soil), and plants. Aquaponic systems are sustainable and environmentally friendly. Its use not only helps to plant in small spaces but also helps reduce artificial chemical use and minimizes excess water use, as aquaponics consumes 90% less water than soil-based gardening. The study applied a descriptive and experimental design to assess and compare conventional and reconstructed aquaponic methods for reproducing tomatoes. The researchers created an observation checklist to determine the significant factors of the study. The study aims to determine the significant difference between traditional aquaponics and reconstructed aquaponics systems propagating tomatoes in terms of height, weight, girth, and number of fruits. The reconstructed aquaponics system’s higher growth yield results in a much more nourished crop than the traditional aquaponics system. It is superior in its number of fruits, height, weight, and girth measurement. Moreover, the reconstructed aquaponics system is proven to eliminate all the hindrances present in the traditional aquaponics system, which are overcrowding of fish, algae growth, pest problems, contaminated water, and dead fish.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
The Python for beginners. This is an advance computer language.
Combined scaled manhattan distance and mean of horner’s rules for keystroke dynamic authentication
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 2, April 2020, pp. 770~775
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i2.14815 770
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Combined scaled manhattan distance and mean of horner’s
rules for keystroke dynamic authentication
Didih Rizki Chandranegara, Hardianto Wibowo, Agus Eko Minarno
Informatic Engineering, Universitas Muhammadiyah Malang, Indonesia
Article Info ABSTRACT
Article history:
Received Aug 30, 2019
Revised Dec 26, 2019
Accepted Feb 10, 2020
Account security was determined by how well the security techniques
applied by the system were used. There had been many security methods that
guaranteed the security of their accounts, one of which was Keystroke
Dynamic Authentication. Keystroke Dynamic Authentication was an
authentication technique that utilized the typing habits of a person as a
security measurement tool for the user account. From several research,
the average use in the Keystroke Dynamic Authentication classification is
not suitable, because a user's typing speed will change over time, maybe
faster or slower depending on certain conditions. So, in this research, we
proposed a combination of the Scaled Manhattan Distance method and
the Mean of Horner's Rules as a classification method between the user and
attacker against the Keystroke Dynamic Authentication. The reason for using
Mean of Horner’s Rules can adapt to changes in values over time and based
on the results can improve the accuracy of the previous method.
Keywords:
Authentication
Biometric authentication
Keystroke dynamic
authentication
Mean of horner’s rules
Scaled manhattan distance
This is an open access article under the CC BY-SA license.
Corresponding Author:
Didih Rizki Chandranegara,
Informatic Engineering,
Universitas Muhammadiyah Malang, Indonesia.
Email: didihrizki@umm.ac.id
1. INTRODUCTION
Generally, to access a system service, users need an account that contains a username
and password [1, 2]. The main key to securing an account is a password. At present, passwords are one
of the popular authentication methods [3-5]. Usually, the contents of the password used by the user contain
a variety of information they have (or what they know), such as full name, date of birth to the name of his
parents [6, 7]. Passwords are a simple authentication method that is very easy to implement. That is why
there are still many systems in cyberspace utilizing this conventional method. Because of its ease
of implementation, many ways can be done to guess passwords from system users such as dictionary attack
and brute force attacks [8, 9]. However, there is a technique that can be done so that the account is not easily
broken into by adding some special characters (example: "<% $ @!") [3]. But, it is not easy to remember for
users, because users must remember the characters they use every time they log in to the system [1] and they
cannot easy log into the system [9]. And if the user has not used his account for a long time, there is an
indication that the user will not be able to log into the system because he/she has forgotten the password
used. So, it makes users frustrations because cannot log into the system [10].
Keystroke Dynamic Authentication (KDA) is one of the right solutions in several previous
problems. KDA is an authentication technique that utilizes the habit of typing someone as a login parameter
from the user of a system [6, 11, 12]. The purpose of KDA is to increase the security of using passwords that
have been widely used and handle various account security issues that are often broken into by irresponsible
2. TELKOMNIKA Telecommun Comput El Control
Combined scaled manhattan distance and mean of horner’s rules… (Didih Rizki Chandranegara)
771
users (hackers or attackers) [3, 6]. KDA is one of the Biometric Authentication techniques. Biometric
Authentication utilizes something unique from users such as the face, fingerprints, and habits (in this case
KDA) [3, 6, 13]. And every person face, fingerprints, and habits can not be imitated by others (one of
the habits is typing characters using the keyboard or KDA). This also shows that the application of KDA to
a system is very safe [14]. Then, the main reason for using KDA in this research is that it does not require
expensive costs (low costs) and does not need any additional devices [14-16] (only uses the keyboard).
This differentiates KDA with another Biometric Authentication which using adding devices (such as face or
fingerprints) [17]. Another advantage of KDA is that the characters used in the password do not have to
utilize special characters, but can use the alphabet and numeric characters [6, 15]. Because utilizes the KDA
method, users who enter into the system will not realize that the system they are using has used the KDA
method for their account security.
There are KDA researches that utilize the Scaled Manhattan method [3, 18]. They utilize
the average in the research conducted. The use of averages has a weakness for data streams such as KDA ie
the value does not change with time [15]. That is, a user's typing speed will change over time (maybe faster
or slower depending on certain conditions). The use of averages is not suitable for this problem, so we
propose the use of Mean of Horner's Rules (MHR) which can adapt to changes in values over time. Also, by
using MHR on KDA, it can improve accuracy in the classification between attackers and users rather than
using averages [6, 15]. So in this research, we will do a combination of the Scaled Manhattan method and
MHR to improve accuracy in the classification between attackers and users. And, for more details on
the methods used, the final results and discussion of this research can be seen in the next chapter.
2. RESEARCH METHOD
This research uses Scaled Manhattan Distance [3, 19] combined with Mean of Horner’s Rules
(MHR) [15]. The purpose of this combination is to improve the accuracy of the classification between
attackers and users. This has been proven from the results of research from Chandranegara and Sumadi [6]
that utilize a combination of MHR and the accuracy of the methods developed is improved compared
to the previous method. Where the classification method used without MHR produces an accuracy of
approximately 75% and when combined with MHR it becomes approximately 93% (increasing by 18%).
While the Dynamic Keystroke data used is derived from the results of Killourhy and Maxion [19].
Following is the formula of the Scaled Manhattan Distance method [3, 19]:
∅ 𝑛 = ∑ |𝑓𝑝,𝑛 − 𝑔 𝑛̅̅̅̅|/𝑎 𝑛
𝑝
1 (1)
where p is total of training data and n is a feature of the data. Whereas f_(p,n) is the training data of the nth
feature with p=1,...p. (g_n ) ̅ is the average of training data per feature and a_n is the absolute deviation
of training data per feature. To get an absolute deviation you can use a formula like the following [3, 19]:
𝑎 𝑛 =
1
𝑞
∑ |𝑓𝑞,𝑛 − 𝑔 𝑛̅̅̅̅𝑞
1 | (2)
where q is total of training data and n is a feature of the data. 𝑓𝑞,𝑛 is the training data of the nth feature with
q=1,...q. Furthermore, to find the MHR value, the following formula can be used [6, 15]:
𝑀𝐻𝑅 = (
(
(
𝑥1 + 𝑥2
2 ) + 𝑥3
2
) + 𝑥4
. . .
)
+ 𝑥 𝑛
2
(3)
where Xn is the nth data from the training data.
This research proposes a combination of Mean of Horner's Rules (MHR) which can be seen
as follows :
∅ 𝑛 = ∑ |𝑓𝑚,𝑛 − 𝑀𝐻𝑅 𝑛|/(𝑎 𝑛)𝑚
𝑚=1 (4)
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 770 - 775
772
where this combination is done by replacing the average value with MHR. The purpose of using this MHR is
to improve the accuracy of the previous method. This is reinforced from the results of Chandranegara and
Sumadi's research [6] which states that accuracy increases by replacing the average using MHR. For
classification between attackers and users we use classifications like the following [6]:
- If | 𝑀𝐻𝑅 𝑛 − 𝑇𝑛| ≤ ∅ 𝑛, then the user is considered as an actual user.
- If | 𝑀𝐻𝑅 𝑛 − 𝑇𝑛| > ∅ 𝑛, then the user is considered as an attacker.
Where T is the testing data and n is a feature of the testing data.
As an evaluation of KDA method which aims to find out how good the proposed KDA method is in
accepting users or rejecting attackers, in this research we use FAR (False Acceptance Rate) and FRR
(False Rejected Rate) values [15, 20, 21]. FAR is a possible system/method for accepting an attacker
as a user [15, 20, 21]. Whereas FRR is the possibility of a system/method to reject users and detect them
as attackers [15, 20, 21]. How to get the FAR and FRR values can be seen in formulas (5) and (6),
provided that the smaller the value of the FAR or FRR, the better the results of the KDA classification
applied [6, 22].
𝐹𝐴𝑅 =
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑐𝑐𝑒𝑝𝑡𝑎𝑛𝑐𝑒 𝑎𝑡𝑡𝑎𝑐𝑘𝑒𝑟
𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑎𝑡𝑡𝑎𝑐𝑘𝑒𝑟
(5)
𝐹𝑅𝑅 =
𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑟𝑒𝑗𝑒𝑐𝑡𝑒𝑑 𝑢𝑠𝑒𝑟
𝑡𝑜𝑡𝑎𝑙 𝑛𝑢𝑚𝑏𝑒𝑟 𝑜𝑓 𝑢𝑠𝑒𝑟
(6)
In addition to FAR and FRR, we also evaluate using accuracy with the following formula [6]:
𝐴𝑐𝑐𝑢𝑟𝑎𝑐𝑦 = (
𝑇𝑃+𝑇𝑁
𝑇𝑃+𝐹𝑃+𝑇𝑁+𝐹𝑁
) 𝑥100% (7)
where TP (True Positive), TN (True Negative), FP (False Positive), and FN (False Negative).
TP is the success to accept users as actual users and TF is the success to detect attackers. Whereas FP is
a misclassification for accepting an attacker and detecting it as a actual user and FN is a misclassification for
refusing an actual user and detecting it as an attacker. To get the accuracy value as explained before,
we use several scenarios like the following:
a. Dynamic Keystroke Data is divided into 2 types i.e. training data and testing data.
b. Data Training for every user is the first 350 data from a dataset. For illustration training, User “A”
training data uses data from 1 to 350, from a total of 400 KDA data.
c. Data Testing for every user is the last 50 data from a dataset. For illustration testing, User "A" uses KDA
data from 350 to 400, from a total of 400 KDA data as testing data.
d. Furthermore, each user in this data will be used as an attacker for every other user. Thus, as many as
51 attack scenarios will be formed (where the total users of the data used are 51 people). And the attacker
data used is the last 50 data of dataset that is used as an attacker.
Testing methods used in this research use a program (using php programming) that is made in
accordance with the proposed method and previous methods and adapted to predetermined scenarios.
3. RESULTS AND ANALYSIS
3.1. Dataset
This research uses Keystroke Dynamic data from Killourhy and Maxion [19]. In this data, there are
51 users (30 male and 21 female) and each user has 400 Dynamic Keystroke data. This data was obtained
by them within 8 days, where every day obtained Dynamic Keystroke data as much as 50 data perusers.
The time used in this data is seconds. The character used in Keystroke Dynamic data recording
is "tie5Roanl". The use of this character has also been based on several attempts and the result is that this
character has a high level of password security. In this data, each user types characters and records them.
There are several important feature elements contained in this data, i.e. [6, 7, 20, 23, 24, 25] (illustration of
these important features and contained from the data used can be seen in Figure 1):
a. Hold time (H) is the time needed to press a character (Key-Down to Key-Up).
b. Up-Down (UD) is the time between releasing (Key-Up) characters to pressing the next (Key-Down)
character or commonly referred to as Latency Time.
c. Down-Down (DD) is the time taken when pressing the first character (Key-Down) to press the second
character (Key-Down) or commonly referred to as Flight Time.
Total features in this data are 31 features. Where each feature consists of:
4. TELKOMNIKA Telecommun Comput El Control
Combined scaled manhattan distance and mean of horner’s rules… (Didih Rizki Chandranegara)
773
a. Holdtime character ".", Character "t" to the last character that is "l" and pressing the "return" button
is also included. So that the total is 11 features.
b. Up-Down (UD) characters "." And "t" to UD between the last character with the "return" button. So that
the total is 10 features.
c. Down-Down (DD)/Flight Time between the characters "." Until the last character, "l" and pressing
the "return" button are also entered. So the total is 11.
Figure 1. Illustration of KDA Features [6]
3.2. Result and analysis
Based on the test results, the proposed method produces a less good accuracy of 50.113%.
While the accuracy of the previous method is 50.335%. However, the FAR value of the proposed method has
decreased from the previous method (the proposed method has a FAR value of 0.976 and the previous
method has a FAR value of 0.98). The increase does not occur at accuracy but in the FAR value. Because it
has not shown better accuracy, we have modified the proposed method by adding coefficient 5 and can
be seen in formula (7).
∅ 𝑛 = ∑ |𝑓𝑚,𝑛 − 𝑀𝐻𝑅 𝑛|/(5 ∗ 𝑎 𝑛)𝑚
𝑚=1 (7)
After the modification, the accuracy is quite high. The reason for using the coefficient number 5 is
based on several experiments using other coefficients from 1 to 7 (The results of the coefficient experiment
can be seen in Table 1). Based on the test results, it appears that coefficient 5 has FAR and FRR values of
0.356 and 0.305 see Table 1. The FAR and FRR values of the coefficient 5 show almost the same value and
can be said to be balanced. Whereas in other coefficients, the FAR value is low but the FRR value is high and
vice versa, the FRR value is low but the FAR value is high.
Table 1. Result of using coeffesien in proposed method
Coeffesien FAR FRR
1 0.976 0.021
2 0.863 0.082
3 0.673 0.172
4 0.490 0.241
5 0.356 0.305
6 0.251 0.367
7 0.179 0.425
There are reasons why we don't use other coefficients that have the lowest FAR or FRR values, i.e.:
a. If the FAR value is high, then the possibility of the system accepting the attacker as an actual user
is higher.
b. If the FRR value is high, then the possibility of the system rejecting actual users or assuming actual users
as attackers are higher.
These two reasons are our main benchmarks for using coefficient 5. Also, this reason is based on the results
of previous studies [6, 15]. The results of the test in the form of accuracy using the proposed method given
coefficients and the previous method have been presented in Table 2. And the results of this test
are the average accuracy obtained from 51 preplanned scenarios.
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 2, April 2020: 770 - 775
774
Table 2. Results of Research
Method Average of Accuracy (%)
Scaled Manhattan Distance 50.335
Combined Scaled Manhattan Distance with MHR (Coeffesien=5) 66.963
4. CONCLUSION
Based on the results of the research conducted, it appears that the accuracy of the proposed method
has not increased compared to the previous method. This is because the value of the Scaled Manhattan
Distance Modification produced is less suitable for accepting users and rejecting attackers. So we try to add
coefficient to increase the value. And the results show that its accuracy can be increased even if not
significantly. And the best coefficient used in this proposed method is number 5. Because based on
the results of tests conducted previously, shows that coefficient 5 gives the smallest FAR and FRR values
compared to other coefficients. However, although accuracy does not increase if it does not add coefficient,
this proposed method can reduce the FAR (false acceptance rate). Means, the proposed method without
coefficient has a good result on FAR but not on the accuracy value.
In next research, it is expected to be able to add feature selection so that the computational
classification is reduced and can also select features that are considered important in Keystroke Dynamic
Authentication. Also, we can do some modifications to other methods that apply averages as their
classification. And based on our research, the accuracy value cannot be used as a benchmark that the method
is good or not, but we can use other parameters besides accuracy as in the case of KDA namely the FAR and
FRR values. Then based on the results of this research, this proposed method can be applied to real
or desktop-based login systems. And users will not be aware if the login method has been applied Keystroke
Dynamic Authentication security.
ACKNOWLEDGEMENTS
This research is supported by Laboratorium Informatika Universitas Muhammadiyah Malang.
The authors wish to thank Universitas Muhammadiyah Malang for providing the funding.
REFERENCES
[1] Zahid S., Sean B., Bojan C., “Normalizing variations in feature vector structure in keystroke dynamics
authentication systems,” Software Quality Journal, vol. 24, pp. 137-157, 2016.
[2] Romain G., Mohamad E., Christophe R., “Greyc keystroke: a benchmark for keystroke dynamics
biometric systems,” 3rd
International Conference on Biometrics: Theory, Applications, and Systems, vol 6,
Washington, 2016.
[3] Aythami M., Mario F., Julian F., Carlo S., Javier O., “Keystroke dynamics recognition based on personal data:
A comparative experimental evaluation implementing reproducible research,” International Conference on
Biometrics Theory, Applications and Systems (BTAS), 2015.
[4] Lin C. H., Liu J, C., Lee K. Y., “On Neural Networks for Biometric Authentication Based on Keystroke
Dynamics,” Sensors and Materials, vol. 30, no. 3, pp. 385-396, 2018.
[5] Antal M., Szabó L. Z., “An evaluation of one-class and two-class classification algorithms for keystroke
dynamics authentication on mobile devices,” 20th
International Conference on Control Systems and Computer
Science, 2015.
[6] Chandranegara DR, Sumadi FDS., “Keystroke Dynamic Authentication Using Combined MHR (Mean of
Horner’s Rules) and Standard Deviation,” Kinetik: Game Technology, Information System, Computer Network,
Computing, Electronics, and Control, vol. 4, no. 1, pp. 13-18, 2018.
[7] Al-Athari F. M., Hussain A. K., “Selection of the Best threshold in Biometric Authentication by Exhaustive
Statistical Pre-Testing,” International Journal of Computer and Information Technology, vol. 3, no. 4, 2014.
(ISSN: 2279–0764)
[8] Kobojek P., Saeed K., “Application of recurrent neural networks for user verification based on keystroke
dynamics,” Journal of telecommunications and information technology, vol. 3, pp. 80-90, 2016.
[9] Alsultan A., Warwick K., Wei H., “Improving the performance of free-text keystroke dynamics authentication by
fusion,” Applied Soft Computing, vol. 70, pp. 1024-1033, 2018.
[10] Alsultan A., Warwick K., Wei H., “Non-conventional keystroke dynamics for user authentication,” Pattern
Recognition Letters, vol. 89, pp. 53-59, 2017.
[11] Pinto P., Patrão B., Santos H., “Free typed text using keystroke dynamics for continuous authentication,” IFIP
International Conference on Communications and Multimedia Security, Springer, 2014.
[12] Morales A., Fierrez J., Tolosana R., Ortega-Garcia J., Galbally J., Gomez-Barrero M., et al., “Keystroke
biometrics ongoing competition,” IEEE Access, vol. 4, pp. 7736-7746, 2016.
6. TELKOMNIKA Telecommun Comput El Control
Combined scaled manhattan distance and mean of horner’s rules… (Didih Rizki Chandranegara)
775
[13] Rybnik M., Panasiuk P., Saeed K., Rogowski M., editors, “Advances in the keystroke dynamics: the practical
impact of database quality,” IFIP International Conference on Computer Information Systems and Industrial
Management, 2012.
[14] Chandrasekar V., Kumar S. S., Maheswari T., “Authentication based on keystroke dynamics using stochastic
diffusion algorithm,” Stochastic Analysis and Applications, vol. 34, no. 1, pp. 155-164, 2016.
[15] Ho J., Kang D. K., “One-class naïve Bayes with duration feature ranking for accurate user authentication using
keystroke dynamics,” Applied Intelligence, vol. 48, no. 6, pp. 1547-1564, 2018.
[16] Ivannikova E., David G., Hämäläinen T., “Anomaly detection approach to keystroke dynamics-based user
authentication,” 2017 IEEE Symposium on Computers and Communications (ISCC), 2017.
[17] Chang T. Y., Tsai C. J., Tsai W. J., Peng C. C., Wu H. S., “A changeable personal identification number‐based
keystroke dynamics authentication system on smart phones,” Security and Communication Networks, vol. 9,
no.15, pp. 2674-2685, 2016.
[18] Araújo L. C., Sucupira L. H., Lizarraga M. G., Ling L. L., Yabu-Uti J. B. T., “User authentication through typing
biometrics features,” IEEE transactions on signal processing, vol. 53, no. 2, pp. 851-855, 2005.
[19] Killourhy K. S., Maxion R. A., “Comparing anomaly-detection algorithms for keystroke dynamics,” 2009
IEEE/IFIP International Conference on Dependable Systems & Networks, 2009.
[20] Teh P. S., Teoh A. B. J., Yue S., “A survey of keystroke dynamics biometrics,” The Scientific World
Journal, 2013.
[21] Wu P. Y., Fang C. C., Chang J. M., Kung S. Y., “Cost-effective kernel ridge regression implementation
for keystroke-based active authentication system,” IEEE transactions on cybernetics, vol. 47, no. 11,
pp. 3916-3927, 2016
[22] Jagadamba G., Sharmila S., Gouda T., “A secured authentication system using an effective keystroke dynamic,”
Emerging research in electronics, computer science and technology, Springer, pp. 453-460, 2014.
[23] Al-Jarrah M. M., “An anomaly detector for keystroke dynamics based on medians vector proximity,” Journal of
Emerging Trends in Computing and Information Sciences, vol. 3, no. 6, pp. 988-993, 2012.
[24] Alghamdi SJ, Elrefaei LA, “Dynamic user verification using touch keystroke based on medians vector
proximity,” 2015 7th
International Conference on Computational Intelligence, Communication Systems and
Networks, 2015.
[25] Wankhede SB, Verma S., “Keystroke dynamics authentication system using neural network,” International
Journal of Innovative Research and Development, vol. 3, no. 1, pp. 157-164, 2014.