Sciweavers

IJOE
2016
67views more  IJOE 2016»
9 years 12 months ago
The Application and Practice of the Voltage Reactive Power Optimization Automatic Control System (AVC)in the Power Grid of Wuhu
: In the paper, the influence of harmonic was taken into consideration during the realization of the AVC system in the power grid of Wuhu region, relevant study and development wer...
Liang Sun, Xusheng Jian, Wenqiang Yuan
IJOE
2016
62views more  IJOE 2016»
9 years 12 months ago
Dynamic Simulation of Crank-group Driving Mechanism with Clearance
: For the crank-group driving mechanism, the assembly clearances can offer the possibility to move overcoming the processing errors. But the clearances inevitably affect the dynami...
Yansong Liu, Jujiang Cao
59
Voted
IJNSEC
2016
83views more  IJNSEC 2016»
9 years 12 months ago
Rank Correlation for Low-Rate DDoS Attack Detection: An Empirical Evaluation
A low-rate distributed denial of service (DDoS) attack has the ability to obscure its tra c because it is very similar to legitimate tra c. It can easily evade current detection m...
Arindom Ain, Monowar H. Bhuyan, Dhruba K. Bhattach...
38
Voted
IJNSEC
2016
40views more  IJNSEC 2016»
9 years 12 months ago
Stride Towards Proposing Multi-Modal Biometric Authentication for Online Exam
Biometric authentication has been getting widespread attention over the past decade with growing demands in automated secured personal identification and has been employed in div...
A. Prakash, R. Dhanalakshmi
33
Voted
IJNSEC
2016
35views more  IJNSEC 2016»
9 years 12 months ago
Weaknesses of Password Authentication Scheme Based on Geometric Hashing
We show that a recently proposed password authentication scheme based on geometric hashing has several security weaknesses, and that the use of this scheme should be avoided in pr...
Martin Stanek
38
Voted
IJNSEC
2016
39views more  IJNSEC 2016»
9 years 12 months ago
Threshold Signature Scheme without Using Polynomial Interpolation
In a (t, n) secret sharing scheme (SS), the secret is shared among n shareholders in such a way that (a) with t or more than t shares can recover the secret, and (b) with fewer th...
Lein Harn, Feng Wang
37
Voted
IJNSEC
2016
39views more  IJNSEC 2016»
9 years 12 months ago
Penetration Testing and Mitigation of Vulnerabilities Windows Server
Cyber attack has become a major concern over the past few years. While the technical capability to attack has declined, hacking tools - both simple and comprehensive - are themsel...
Deris Stiawan, Mohd Yazid Idris, Abdul Hanan Abdul...
37
Voted
IJNSEC
2016
50views more  IJNSEC 2016»
9 years 12 months ago
A New Robust Blind Copyright Protection Scheme Based on Visual Cryptography and Steerable Pyramid
In this paper, we proposed a novel blind digital image copyright protection scheme based on Steerable pyramid transform (SPT) and visual cryptography (VC). Unlike traditional wate...
Azz El Arab El Hossaini, Mohamed El Aroussi, Khadi...
34
Voted
IJNSEC
2016
50views more  IJNSEC 2016»
9 years 12 months ago
A Quantitative and Qualitative Analysis-based Security Risk Assessment for Multimedia Social Networks
The emerging Multimedia Social Network (MSN) provides much more conveniences for the transmission and sharing of multimedia digital contents. However, the scenario on the distribu...
Zhiyong Zhang, Lijun Yang, Hanman Li, Fei Xiang
50
Voted
IJNSEC
2016
48views more  IJNSEC 2016»
9 years 12 months ago
Key Trees Combining Algorithm for Overlapping Resource Access Members
In cloud computing environment, resources are accessed by multiple members. Resources may be considered as VM, CPU, Storage etc. Group key management required when multiple member...
Amar Buchade, Rajesh Ingle