International Journal of Research in Engineering and Science is an open access peer-reviewed international forum for scientists involved in research to publish quality and refereed papers. Papers reporting original research or experimentally proved review work are welcome. Papers for publication are selected through peer review to ensure originality, relevance, and readability.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
International Journal of Engineering and Science Invention (IJESI)inventionjournals
International Journal of Engineering and Science Invention (IJESI) is an international journal intended for professionals and researchers in all fields of computer science and electronics. IJESI publishes research articles and reviews within the whole field Engineering Science and Technology, new teaching methods, assessment, validation and the impact of new technologies and it will continue to provide information on the latest trends and developments in this ever-expanding subject. The publications of papers are selected through double peer reviewed to ensure originality, relevance, and readability. The articles published in our journal can be accessed online.
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ppt of class and methods in java,recursion in java,nested class,java,command line argument,method overloading,call by value,call by reference,constructor overloading core java ppt
In this playlist
https://youtube.com/playlist?list=PLT...
I'll illustrate algorithms and data structures course, and implement the data structures using java programming language.
the playlist language is arabic.
The Topics:
--------------------
1- Arrays
2- Linear and Binary search
3- Linked List
4- Recursion
5- Algorithm analysis
6- Stack
7- Queue
8- Binary search tree
9- Selection sort
10- Insertion sort
11- Bubble sort
12- merge sort
13- Quick sort
14- Graphs
15- Hash table
16- Binary Heaps
Reference : Object-Oriented Data Structures Using Java - Third Edition by NELL DALE, DANEIEL T.JOYCE and CHIP WEIMS
Slides is owned by College of Computing & Information Technology
King Abdulaziz University, So thanks alot for these great materials
Do not repeat yourself, we teach every fledgling software developer. It makes sense as with growing code redundancy the maintenance cost increase. Simple tools such as functions or loops are a great ways to reduce code redundancy but in our quest to avoid code redundancy we sometimes indulge into complexity. Complex code is also costly to maintain. I will demonstrate, using real-world examples, how one can adopt metaprogramming to minimize code redundancy as well keeping the code simple enough for my mom to understand it.
A New Signature Protocol Based on RSA and Elgamal SchemeZac Darcy
In this paper, we present a new signature scheme based on factoring and discrete logarithm problems.
Derived from a variant of ElGamal signature protocol and the RSA alg
Key Topics are ....
Number Theory
Public key encryption
Modular Arithmetic
Euclid’s Algorithm
Chinese Remainder Theorem
Euler's Theorem
Fermat's Theorem
RSA Public Key Encryption
Implementation of Elliptic Curve Digital Signature Algorithm Using Variable T...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
ppt of class and methods in java,recursion in java,nested class,java,command line argument,method overloading,call by value,call by reference,constructor overloading core java ppt
In this playlist
https://youtube.com/playlist?list=PLT...
I'll illustrate algorithms and data structures course, and implement the data structures using java programming language.
the playlist language is arabic.
The Topics:
--------------------
1- Arrays
2- Linear and Binary search
3- Linked List
4- Recursion
5- Algorithm analysis
6- Stack
7- Queue
8- Binary search tree
9- Selection sort
10- Insertion sort
11- Bubble sort
12- merge sort
13- Quick sort
14- Graphs
15- Hash table
16- Binary Heaps
Reference : Object-Oriented Data Structures Using Java - Third Edition by NELL DALE, DANEIEL T.JOYCE and CHIP WEIMS
Slides is owned by College of Computing & Information Technology
King Abdulaziz University, So thanks alot for these great materials
Do not repeat yourself, we teach every fledgling software developer. It makes sense as with growing code redundancy the maintenance cost increase. Simple tools such as functions or loops are a great ways to reduce code redundancy but in our quest to avoid code redundancy we sometimes indulge into complexity. Complex code is also costly to maintain. I will demonstrate, using real-world examples, how one can adopt metaprogramming to minimize code redundancy as well keeping the code simple enough for my mom to understand it.
A New Signature Protocol Based on RSA and Elgamal SchemeZac Darcy
In this paper, we present a new signature scheme based on factoring and discrete logarithm problems.
Derived from a variant of ElGamal signature protocol and the RSA alg
Key Topics are ....
Number Theory
Public key encryption
Modular Arithmetic
Euclid’s Algorithm
Chinese Remainder Theorem
Euler's Theorem
Fermat's Theorem
RSA Public Key Encryption
Ein Blick in die Kristallkugel mit dem Ziel spannende und relevante Online-Trends für das Jahr 2007 hervorzusagen. Auf der Liste sind:
- Enterprise Wikis
- Software as a Service (SES)
- OpenID
- WPF/E (=Windows Presentation Foundation / Everywhere) Neu: Microsoft Silverlight
- SIP/IMS
- Online TV
- Wireless Commons / OLSR
- Live Clipboard
- Scrum
- Geo tagging
In classical data analysis, data are single values. This is the case if you consider a dataset of n patients which age and size you know. But what if you record the blood pressure or the weight of each patient during a day ? Then, for each patient, you do not have a single-valued data but a set of values since the blood pressure or the weight are not constant during the day.
Suppose now that you do not want to record blood pressure a thousand times for each patient and to store it into a database because your memory space is limited. Therefore, you need to aggregate each set of values into symbols: intervals (lower and upper bounds only), box plots, histograms or even distributions (distribution law with mean and variance)...
Thus, the issue is to adapt classical statistical tools to symbolic data analysis. More precisely, this article is aimed at proposing a method to fit a regression on Gaussian distributions. This paper is divided as follows: first, it presents the computation of the maximum likelihood estimator and then it compares the new approach with the usual least squares regression.
Novel encryption algorithm and software development ecc and rsaSoham Mondal
Awarded 2nd prize in the event Papier (scientific paper presentation) conducted by Jadavpur University Electrical Engineering Department, named Convolution, under the aegis of IET and IEEE Signal Processing Society in 2018
Can we reveal the RSA private exponent d from its public key <e, n>? We study this question for two specific cases: e = 3 and e = 65537. Using demos, we verify that RSA reveals the most significant half of the private exponent d when the public exponent e is small. For example, for 2048-bit RSA, the most significant 1024 bits are revealed!
Cryptography is the practice and study of techniques for conveying information security.
The goal of Cryptography is to allow the intended recipients of the message to receive the message securely.
The most famous algorithm used today is RSA algorithm
The 1741 Goldbach [1] made his most famous contribution to mathematics with the conjecture that all even numbers can be expressed as the sum of the two primes (currently Conjecture) referred to as “all even numbers greater than 2 can be expressed as the sum-two primes” (DOI:10.13140/RG.2.2.32893.69600/1)
Construction of BIBD’s Using Quadratic Residuesiosrjce
IOSR Journal of Mathematics(IOSR-JM) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of mathemetics and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in mathematics. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearson’s correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
A two-phase model is proposed for describing the dynamics of a fluidized bed reactor used for
polypropylene production. In the proposed model, the fluidized bed is divided into an emulsion and bubble
phase where the flow of gas is considered to be plug flow through the bubbles and perfectly mixed through the
emulsion phase. Similar previous models, consider the reaction in the emulsion phase only. In this work the
contribution of reaction in the bubble phase is considered and its effect on the overall polypropylene production
is investigated the kinetic model is combined with hydrodynamic model in order to develop a comprehensive
model for gas-phase propylene copolymerization reactor. Simulation profiles of the proposed model were
compared with those of well mixed model for the emulsion phase temperature. The simulated temperature
profile showed a lower rate of change compared to the previously reported models due to lower polymerization
rate. Model simulation showed that about 13% of the produced polymer comes from the bubble phase and this
considerable amount of polymerization in the bubbles should not be neglected in any modeling attempt.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39°C-42°C and the boiling point is in
the range 70 °C - 533 °C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Positioning error is a widely problem exists in mechanism, the important factors affecting machining
precision. In order to reduce the error caused by positioning problem processing, based on the differential
workbench as the research object, using the method of theoretical analysis and experimental verification, the
analysis of positioning error mechanism and source of complete differential precision workbench error
compensation, improve the accuracy of the device, provides a method for the application of modern machine
tools. table.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15℃ and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63℃ The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
In the process of oil and gas exploitation of mudstone-fractured reservoir in Daqing oilfield, the
permeability of fracture is easily affected by the influence of stress change, which is shown by the sensitivity of
the permeability to the stress. With the extension of time mining in the fractured mudstone reservoir, fracture
stress sensitivity is obvious in vast decline of production and great influence on reduced yields. In order to
reasonably determine the way of developing method, working system and the exploitation rate of the reservoir,
correspondingly protecting reservoir productivity, improve ultimate recovery. On the basis of the previous
research on the stress sensitivity of fractured mudstone, this essay studied the critical closing pressure of the
simulated underground fractured mudstone under the laboratory condition.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40℃ to 125℃, experimental
results implemented with SMIC 0.18μm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/℃ and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/℃.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNT’s whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
Connector Corner: Automate dynamic content and events by pushing a button
D0111720
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 1 Issue 1 ǁ May. 2013 ǁ PP.17-20
www.ijres.org 17 | Page
An Identity Based Encryption Scheme based on Pell’s
Equation With Jacobi Symbol
1
Kondala Rao M, 2
K V S S R S S Sarma, 3
P S Avadhani
1
Department of Computer Science and Systems Engineering, Andhra University, India,
2
Department of Computer Information Science, University of Hyderabad, Hyderabad, India,
3
Department of Computer Science and Systems Engineering Andhra University, Visakhapatnam, India,
Abstract:- In this paper, we propose a novel public key cryptosystem in which the public key of a
subscriber can be chosen to be a publicly known value, such as his identity. Identity based encryption
scheme developed is a public key cryptosystem and it is based on Pell’s equation. This paper
demonstrates algorithms for key generation, encryption and decryption based on Pell’s equation with
Jacobi symbol.
Keywords:- pells equation, Legendre symbol, Jacobi symbol, permanent private secret.
I. INTRODUCTION
In an offline public key system, in order to send encrypted data it is necessary to know the public key
of the recipient. This usually necessitates the holding of directories of public keys. In an identity based system a
user’s public key is a function of his identity (for example his email address), thus avoiding the need for a
separate public key directory. The possibility of such a system was first mentioned by Shamir[4]. But it has
proved difficult to find implementations that are both practical and secure, although recently an implementation
based on elliptic curves has been proposed[3]. This paper describes an identity based cryptosystem which uses
Pell’s equation.
The system has an authority which generates a universally available public M. This modulus is a
product of two primes p and q held privately by the authority. Also, the system will make use of a universally
available secure hash function. Then, if user Alice wishes to register in order to be able to receive encrypted data
she presents her identity (e.g. email address) to the authority. In return she will be given a private key with
properties. A user Bob who wishes to send encrypted data to Alice will be able to do this knowing only Alice’s
public identity and the universal system parameters. There is no need for a public key directory.
There were some methods developed in which administer verifies the information, such as RSA. In
recent years, because of the development of public key cryptography functions, a new method of verification is
accordingly being created. When comparing RSA with Pell’s Equation, Proposed scheme is more secure and
faster than RSA Public Key Cryptography to achieve the same level of security as Pell’s Equation.
II. PROPOSED SCHEME
1.1 Pell’s equation based encryption system
Our scheme is based on Pell’s equation, and to begin with, we briefly introduced this scheme. We can
divide Pell’s schemes into four parts, Pell’s equation, Key Management, Encryption and Decryption. This
scheme also needs a trusted third party can decide the contents of the published information, whereas others can
only download without permission to modify it.
1.2 Pell’s Equation
In number theory, for any constant integer D the equation x2
−D y2
≡ 1 is called the Pell’s equation[1].
This has many applications in various branches of science. The set of all pairs(x, y) describes cyclic group Gp
over the Pell’s equation x2
−D y2
≡ 1 (mod P), where P is an odd prime.
The properties are also found in the group GN over the Pell’s equation x2
−D y2
≡ 1 (mod N), where N is a
product of two primes. This group GN then developed to be a public key crypto scheme based on Pell’s
equations over the ring ZN
*
.
From the group GN, we find a group isomorphism mapping f : GN → ZN
*
such that a solution (x, y) of
the Pell’s equation x2
− D y2
≡ 1 (mod N), can easily be transformed to unique element u in ZN
*
. This implies
that the plain texts/cipher texts in the in the group GN can easily transformed to the corresponding plain
texts/cipher texts in the RSA scheme[2].
2. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 18 | Page
Let p be an odd prime and D be a non zero quadratic residue element modulo p, which we denote if
with Fp. Gp the set of solutions (x, y) Fp Fp to the Pell equation
x
2
− D y
2
1 (mod P).
We then define an addition operation “ “ on Gp as follows.
If two pairs ( 1x , 1y ), ( 2x , 2y ) Gp, then the third pair ( 3x , 3y ) can be computed as
( 3x , 3y ) ( 1x , 1y ) ( 2x , 2y )
( 1x 2x + D 1y 2y , 1x 2y + 2x 1y ) (mod P).
It is easy to verify that the Gp together with the operation “ “ is an abelian group with the identity
element by (1, 0) and the inverse of the element (x, y) by (x,-y). Further it can be proved that <Gp, > is a
cyclic group of order p-1. Now we want to prove that the group Gp is isomorphic to Fp*, Where Fp*, is all non-
zero elements of Fp denotes a multiplicative group of Fp.
Theorem1:
Gp together with the operation “ “ is a cyclic group of order p-1. Now we want to prove that the group Gp is
isomorphic to Fp
*
, where Fp
*
denotes a multiplicative group of Fp.
Theorem2:
Two groups Gp and Fp
*
are isomorphic Now we define another operation “ ” as follows :
( , ) ( , ) ( , ) ......... ( , )i x y x y x y x y i times over Gp
.
If ( ix , y i ) = i ( ix , y i ) , we expand the above expression and have
ix =
0 k i
kiseven
( i
k )D
/2k
x i-k
yk
;
iy =
0 k i
kisodd
( i
k )D
/2k
x i-k
yk
According to the definition of the mapping f, we have
f (( ix , y i )) ix - a iy
0 k i
kiseven
( i
k )D
/2k
x i-k
yk
- a
0 k i
kisodd
( i
k )D
/2k
x i-k
yk
0 k i
kiseven
( i
k )D
/2k
x i-k
yk
+
0 k i
kisodd
( i
k )D
/2k
x i-k
(–a y)k
(x-ay)i
Because Gp is a cyclic group of order p-1, we have that if k 1 (mod P-1), then
(x,y) = k (x, y), for all (x, y) Gp
Let N be a product of two large primes p and q. Zn
*
denotes a multiplicative group of ZN. From the above
theorem, it is easy to develop the following theorem.
Theorem3:
The mapping f : GN ZN
*
satisfying f ((1,0)) ( 1 mod N ), f ((x, y)) x - ay (mod N), where (x, y)
GN and a2
D (mod N), is a group isomorphism . Its inverse mapping f -1
(1) (1,0) (mod N), f -1
(u) ((u
+ u-1
)/2, (u-1
- u)/2a (mod N), where u ZN
*
.
Theorem 4:
If ( iX , y i ) = i (x, y), over GN , we have ix - a iy ≡ (x - ay)i
( mod N).
Theorem 5:
If k ≡ 1 mod (l .c .m (p-1, q-1)), we have (x, y) = k (x, y), for all (x, y) GN.
3. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 19 | Page
Legendre symbol
Let a be an integer and p > 2 a prime, Define the Legendre Symbol (a/p)=0,1,-1 as follows
a
p
=
0 if p divides a
1 if a is QR mod p
−1 if a NQR mod p
Jacobi Symbol
If p is a positive odd integer with prime factorization
P =
1
r
i
pi
ai
.
The Jacobi symbol ( n / p) is defined for all integers n by the equation
( n / p) =
1
r
i
(n / pi)ai
where (n / pi) is the legendre symbol.
1.3 Key Management
In this step, the Bob chooses the Secrete Key Generation[5], and computes and publishes some
auxiliary information on the bulletin. The Bob will perform the following steps:
1.3.1 Key Generation:
Assume that the Bob to send messages E (cipher text) and Alice case receive the messages E and M.
1. The Bob chooses two primes p and q (p q)
2. The Bob compute
p
= p mod 4 and
q
=q mod 4 where
p
,
q
{1,-1}
3. The Bob find non square integer D > 0 such that Legender symbols
(D/p) = -
p
and (D/p) = -
q
4. The Bob compute n = p * q and m= (p+
p
) (q+
q
) / 4
5.
The Bob select a integer value for S such that the jacobi symbol
( ( S2
- D)/n) = -1. As there are closely to ( ) / 2n such values of S.
6. The Bob select a integer value for e such that ( e, m ) =1. and makes {n, e, S, D} as public.
7. The Bob compute d * e (m+1)/2 mod m for d and keeps as private key
8. D is Key for the Cipher Text.
1.4 Encryption:
The Bob changes the messages M to E.
1. The Bob get the M be a message to communicate / encrypt
2. The Bob compute j1 = (M2
-D)/n
3. The Bob compare If j1 = 1 go to step (4) else go to step (6)
4. The Bob compute x (M2
+D) / ( M2
-D) (mod n )
And y 2M / (M2
-D) (mod n)
5. Go to step (8)
6. The Bob compare If j1 = -1 go to step (7) else go to stop().
7. The Bob compute x ((M2
+D)(S2
+ D) + 4DMS) / (( M2
-D) (S2
- D) ) (mod n )
And y (2S (M2
+D) + 2M (S2
+ D)) / (( M2
-D) (S2
- D) ) (mod n )
8. The Bob compute j2 = x (mod 2) where j2 {0, 1}
(nothing that x2
- Dy2
=1(mod n) for these values of x,
y and assume
that (y, n) =1)
9. The Bob Put Xl = x and Yl = y
10. The Bob compute (Xl+1, Xl) (mod n ) such that
if i j
4. An Identity Based Encryption Scheme based on Pell’s Equation With Jacobi Symbol
www.ijres.org 20 | Page
Xi+j = Xj + D Yi Yj and Yi+j = Xi Yj + Xj Yi
if i = j
X2i = Xi
2
+D Yi
2
or 2 Xi
2
– 1 and Y2i = 2 Xi Yi
11. The Bob compute E = DYXl (Xl+1 – x Xl)-1
mod n (here E is the cipher text) with 0<E<n
12. Send the {E, j1, j2 ) = cipher text.
1.5 Decryption
After receiving the ciphertext (E, j1,j2), the Alice checks that x2
−D y2
≡ 1
If yes, Alice can continue
1. The Alice compute
X2l = (E2
+ D) / (E2
- D) (mod n) and
i. Y2l = (2E / (E2
- D)) (mod n )
2. The Alice compute Xd (X2e) X2de (x)(mod n) and
i. Xd+1 (X2e) X2de+2e (x)(mod n)
ii. We have X2ed = x (mod n) and j2 x (mod 2)
3. The Alice compute and therefore determines x (mod n)
And find y Y 2de (X2de+2e - X2e Xd ) / DX2e mod n
we have t x + y D mod n
Compute t1
such that
t1
= t if j1 = 1 else if j1 = -1
t1
= t (S- D ) / (S + D )
And t1
= (M + D ) / (M - D ) mod n
4. The Alice compute
M (t1
+1) ( D ) / ( t1
-1) (mod n)
The Bob sends message (M) to key generation function that produces a secure private key (D). This
private key is then encrypted with public key cryptosystem using the Bob’s private key to form the result. Both
the message and the result are prepended and then transmitted. The Alice takes the message (M) and produces a
secure private key (D). The Alice also decrypts the result using the Bob’s public key. If the calculated secure
private key (D) matches the decrypted results, the result is accepted as valid. Because only the Bob knows the
private key and only the Bob could have produced a valid result.
III. CONCLUSION
In this paper, we have proposed an Identity based encryption scheme using Pell’s equation with
Legendre and Jacobi symbols. This scheme is a multi-use scheme, which means every Alice only needs to keep
one private secrete. The Alice just use the public information and their own private information to get the
information back. When then identity is changed, the Bob only needs to adjust the private key. And one of the
benefits of this scheme is that the Bob will not ask for some extra information from all the Alice while in the
information updating stage. We also show how to verify the information which comes from other Alice.
Furthermore, because this scheme is constructed on the pells equation, we attain a much higher level of security
comparing with the original public key problem in the same bits length.
REFERENCES
[1]. Chen C.Y., Chang C.C. Yang W.P.,"Fast RSA type cryptosystem based on Pell equation”, Proceeding
of International Conf. On Cryptology and Information Security Taiwan, Dec.1-5, 1996
[2]. C Cocks Split “Generation of RSA Parameters with multiple participants” proceeding of 6th
IMA
conference on Cryptography and Coding, Spring LNCS 1355.
[3]. A. Shamir, “Identity- Based Cryptosystems and Signature schemes advances in Cryptology” –
Proceeding of Crypto’84.
[4]. D. Boneh and M. Franklin, “Identity-based encryption from the Weil paring,” Advances in Cryptology-
Crypto’2001, Lecture Notes on Computer Science 2139, Springer-Verlag (2001), pp.213-229.
[5]. Michael J.JacobSon and Jr.Hugh C.Williams 2009 “Solving the Pell Equation”, pages 353-359.