Data Structures and Algorithms

1509 Submissions

[5] viXra:1509.0259 [pdf] replaced on 2015-10-01 16:55:57

Random-Resistor–random-Temperature Kirchhoff-Law–Johnson-Noise (RRRT-KLJN) Key Exchange

Authors: Laszlo B. Kish, Claes G. Granqvist
Comments: 8 Pages. submitted for journal publication

We introduce two new Kirchhoff-law–Johnson-noise (KLJN) secure key distribution schemes which are generalizations of the original KLJN scheme. The first of these, the Random-Resistor (RR–) KLJN scheme, uses random resistors with values chosen from a quasi-continuum set. It is well-known since the creation of the KLJN concept that such a system could work in cryptography, because Alice and Bob can calculate the unknown resistance value from measurements, but the RR–KLJN system has not been addressed in prior publications since it was considered impractical. The reason for discussing it now is the second scheme, the Random-Resistor–Random-Temperature (RRRT–) KLJN key exchange, inspired by a recent paper of Vadai, Mingesz and Gingl, wherein security was shown to be maintained at non-zero power flow. In the RRRT–KLJN secure key exchange scheme, both the resistances and their temperatures are continuum random variables. We prove that the security of the RRRT–KLJN scheme can prevail at non-zero power flow, and thus the physical law guaranteeing security is not the Second Law of Thermodynamics but the Fluctuation–Dissipation Theorem. Alice and Bob know their own resistances and temperatures and can calculate the resistance and temperature values at the other end of the communication channel from measured voltage, current and power-flow data in the wire. However, Eve cannot determine these values because, for her, there are four unknown quantities while she can set up only three equations. The RRRT–KLJN scheme has several advantages and makes all former attacks on the KLJN scheme invalid or incomplete.
Category: Data Structures and Algorithms

[4] viXra:1509.0162 [pdf] submitted on 2015-09-18 04:02:48

Job Shop Scheduling Using ACO

Authors: Ms. K. Sathya Sundari
Comments: 09 Pages. Figures :4 Tables : 0,, Volume 2, Issue 8, August 2015

Job shop scheduling using ACO(Ant Colony Optimization) approach. Different heuristic information is discussed and three different ant algorithms are presented. State transition rule and pheromone updating methods are given. The concept of the new strategy is highlighted and template for ACO approach is presented.
Category: Data Structures and Algorithms

[3] viXra:1509.0154 [pdf] submitted on 2015-09-18 03:45:27

Implementation of Privacy-Preserved Personalized Web Search based on Fully Homomorphic Encryption over Integers

Authors: Akhila G.S, Prasanth R.S
Comments: 7 Pages.

Using Personalized Web Search (PWS) we can improve the quality of search results in the Internet. The existing UPS based Personalized Web Searching has many drawbacks. First, there may be a chance of eavesdropping when generalized profile forwarded to the server. Second, web server is vulnerable to web attacks like URL manipulation attacks. The impact of these attacks will affect user’s personal information. So we introduce a new framework called UPES. Here, the data stored in the server-side and request from user will be in encrypted form. Fully Homomorphic Encryption over Integers (FHEI) is used for encrypting data. The experimental results show that this framework functioned in the best possible manner with the least waste of time and effort.
Category: Data Structures and Algorithms

[2] viXra:1509.0152 [pdf] submitted on 2015-09-18 03:56:22

Detection System Tajwid Al Quran on Image Using Bray Curtis Distance

Authors: Rizal; Fadlisyah; Muhathir; Al Muammar Akfal
Comments: 08 Pages. Figures :10 Tables : 01;, Volume 2, Issue 8, August 2015

Al Quran is the Muslim holy book written in Arabic. To read the Quran recitation necessary knowledge of the guidelines. In the context of everyday people find difficulty in recitation of the Quran. Therefore, the detection system tajwid needed to help users find the recitation of the Quran. In this study, the method of Bray Curtis Distance is used to detect the image of the Holy Qur'an recitation. The test results show that the accuracy of the system is 60% to 90%. The percentage of detection rate shows that the method can be used Bray curtis as one approach to detection at the image of the Holy Qur'an recitation. This system has several drawbacks that have a high false positive rate, or an error about a 40% chance. To improve the performance of this recitation detection system, can be done by providing further training with additional training data more and more varied. However, this recitation detection system does not deny the importance of teachers in learning how to read in accordance with the rules of recitation is right.
Category: Data Structures and Algorithms

[1] viXra:1509.0104 [pdf] submitted on 2015-09-10 08:53:01

A Formula Based Approach to Arithmetic Coding

Authors: Arundale Ramanathan
Comments: 6 Pages. License: CC 4.0 Attribution

The Arithmetic Coding process involves re-calculation of intervals for each symbol that need to be encoded. This article discovers a formula based approach for calculating compressed codes and provides proof for deriving the formula from the usual approach. A spreadsheet is also provided for verification of the approach. Consequently, the similarities between Arithmetic Coding and Huffman coding are also visually illustrated.
Category: Data Structures and Algorithms