Volume 8, Issue 6, November 2017

Implementation of Data Structure for Digital Representation of Building Model
Pages: 1-3 (3) | [Full Text] PDF (413K)
Svitlana Tsiutsiura, Yevhenii Borodavka and Vladyslav Kvasnevskyi
Kyiv National University of Construction and Architecture, Kyiv 03680, Ukraine

Abstract -
This paper is dedicated to one part of the building lifecycle automation problem. The article is focused at the data structure development for digital representation of building model. We have suggested separate invariant meta-database and core of digital representation model of building.
 Index Terms - Building Lifecycle, PLM, BIM, Building Model, Digital Representation and Database
Multi-modal Biometrics Identification Using Multi-arrays Representation Modal and Pre-Mapping Technique
Pages: 4-8 (5) | [Full Text] PDF (333K)
Eslam F. Al-Hawamdeh
Department of Computer Science and Information Technology, Tafila Technical University, Jordan

Abstract -
Keeping confidential information is becoming more difficult in an increasingly digital world. Neither classic authentication model nor uni-modal biometric system provides enough security to ensure that data is protected out of the unauthorized individuals. For this multi-modal biometric system has become the best suited solution when high level of accuracy and security is required as it requires two biometric credentials for positive identification instead of one in uni-modal biometric system. Traditional multi-modal biometric system uses multi-database fields to get the different biometric credentials and therefore multi matching mechanisms. In this paper we improve the technique to speed up the use of multimodal biometric system by representing the biometric codes and apply fusion over the represented codes so single matching process will be used.
 Index Terms - Biometric, Multi-Modal Biometric System, Fusion, Multi-Arrays Model, Pre-Mapping and Post-Mapping
Analysis of Secure Deletion Mechanism for Critical Data on Android OS Devices
Pages: 9-16 (7) | [Full Text] PDF (369K)
Muhammad Ali Tariq
Department of Computer Science and Engineering, University of Engineering and Technology, Lahore, Pakistan

Abstract -
In present era, the use of smart phones becoming more and more popular due to the advancement of technology and improved services. People use smart phones not only for calls and instant messages but also perform social networking and business transactions. However security and safety of data is always challenging if device is misplaced, lost, stolen or fell into the custody of an adversary. Although data transmission is mostly secured through encryption but all data cannot be encrypted due to efficiency issues. In any case, on numerous gadgets the simple deletion process misdirects client into believing that record have been erased, while that is typically not the situation. Secondly deleted data can also be retrieved using different techniques. Today the majority of these devices use flash storage type to store data, also known as NAND flash memory, due to its optimization. In this research work, we study and analyze currently work done towards secure erasing of data and discuss some remote wiping features that are being introduced in modern devices. Further it provides mechanism to delete critical data, on particular type of storage in android devices, which can ensure that once deleted data can never be able to retrieve by an adversary.
 Index Terms - Android OS, Critical Data, Flash Memory, Mobile Security and Secure Deletion
Multiple Fuzzy Keyword Search Over Encrypted Data Using Date and Time
Pages: - (-) | [Full Text] PDF (329K)
Anagha Ramnath Kadve and S.B. Vanjale
Department of Computer Engineering, Bharati Vidyapeeth Deemed University College of Engineering, Pune Maharastra, India

Abstract -
The enhancement of the network and the growth of huge knowledge, also the remotely out-sourced the data to the cloud, which may avoid the local management of data. The system reduces the required hardware cost. However, some sensitive information, like personal healthcare info and private property info should be encrypted first then outsourced to the cloud. The system will shield confidential information. However, the encrypted data on the cloud will increase the problem of the information retrieval. As a result, the data owner or unauthorized users can't search properly the information they have. It's impractical to transfer all of the information to host side from the cloud, which can end in large communication computation overhead.
 Index Terms - Cloud Computing, Privacy-Preserving, Encryption/Decryption, Ranking, Relevance Score Find, Top-k Monitoring and Security
Pages: - (-) | [Full Text] PDF (746K)

Abstract -
 Index Terms -
Pages: - (-) | [Full Text] PDF (K)

Abstract -
 Index Terms -