Data Structures and Algorithms

2004 Submissions

[9] viXra:2004.0626 [pdf] submitted on 2020-04-27 05:07:50

Survey in the Impact of Block-Chain in Electronic Medical Services

Authors: Asha Ali Juma
Comments: 4 Pages.

Block-chain is a technology that introduce the decentralized and distributed ledger that stores the records which can be accessed publicly. The records or data are stored in blocks which are chained chronologically to preserve the integrity of the data stored in it. any kind of database, the blocks that store the data have two hashes, the hash of the block before it, and the hash of its own which is treated as the fingerprint for the block and protect it from being tempered. The temper-proof and the distributed the block-chain technology have made it to be the most used technology in preserving the integrity and increase the transparency of data in various industries. One of the advantage of using the technology is that despite the data being accessed by anyone in the network, the block that stores the data is immutable. Many misconceptions arose regarding the medical records privacy, risk to the transparency, procedures and other related health issues on the procedures. This paper will review the impact of the block chain technology in electronic medical services to address the issue
Category: Data Structures and Algorithms

[8] viXra:2004.0605 [pdf] submitted on 2020-04-26 10:38:18

An Economical Cloud-of-Clouds System for Storing and Sharing huge Information

Authors: Vinay Gupta
Comments: 5 Pages.

According to abstract we are working on multiple cloud system for storing more data in the cloud or sharing of huge information from one place to another place with minimum cost. According to that we are trying to this project reduce same data to did not store in the cloud that why we are using multiple cloud application or websites to store more data because every cloud is providing minimum space in the cloud & over data is time to time increases. So that we are using MapReduce technology to get same to store different-different data or marge the as a same file of data or Map scale back also identify for checked is their same data or what because we are using of multiple cloud storage to take more space. if data is similar so we are trying to use & identify which gateway server or LBA (Logical Block area) are store as same data of files. This method mainly from uses of multiple big organization, government, Telecom Industry and much more. A hash capability created use of session middle of the topology among minimizes the task all the same is not movement valued in this topology. Why we are working on network topology because multiple customer is working or uses of internet in the same time to reduce the network error or control the network traffic without taking extra time or reduce the network traffic values.
Category: Data Structures and Algorithms

[7] viXra:2004.0515 [pdf] submitted on 2020-04-22 11:48:45

Rankings of Countries Based on Rankings of Universities

Authors: Bahram Kalhor, Farzaneh Mehrparvar
Comments: 13 Pages.

Although many methods have been designed for ranking universities, there is no suitable system that focuses on the ranking of countries based on the performance of their universities. The overall ranking of the universities in a region can indicate the growth of interests in science among the people of that land. This paper introduces a novel ranking mechanism based on the rankings of universities. Firstly, we introduce and discuss two new rankings of countries, based on the rank of their universities. Secondly, we create rankings of countries according to the selected method, based on the top 12000 universities in webometrics.info (January 2012) and compare rankings of countries in 4 editions (January 2012 to July 2013). Firstly, we introduce two new methods of ranking countries based on their university rankings, Weighted Ranking (WR) and Average Ranking (AR). Secondly, we discuss how the introduced ranking systems, perform in ranking countries based on the two years of data. Thirdly, we choose QS (http://www.topuniversities.com) and webometrics.info as two different classification systems for comparing rankings of countries, based on the top 500 universities in these rankings. Results indicate that the methodology can be used to show the quality of the whole universities of each country used to compare rankings of countries in practice compare to other countries in the world.
Category: Data Structures and Algorithms

[6] viXra:2004.0457 [pdf] submitted on 2020-04-19 11:16:01

An Adaptive Technique in Electronic Health Record for Clinical Decision Making Based on Data Visualization

Authors: Meghana Prakash, Vignesh S
Comments: 4 Pages.

Cloud computing is a collection of several computer resources that consists of both software and hardware. It is a type of service that is delivered over the internet and can be accessible from anywhere. [1] The data and services can be accessed through the internet. [4] These services are managed by the third-party over the internet. They eventually provide access to the servers and resources. Health records consist of patient’s data regarding health. This data is usable by both the hospitals and patients. [6] [8] This can be eventually used to track the medical history of patients. Data Visualization is a graphical depiction of the data. It implicates producing images that advertise the link among the data that the users view. Hence, they are used for clinical decision making. In this paper we will be discussing how cloud can be used to maintain health records electronically.
Category: Data Structures and Algorithms

[5] viXra:2004.0381 [pdf] submitted on 2020-04-15 12:51:27

Efficient and Expressive Keyword Search Over Encrypted Data in Cloud

Authors: Zeeshan Sharief
Comments: 2 Pages.

Searchable encryption allows a cloud server to conduct keyword search over encrypted data on behalf of the data users without learning the underlying plaintexts. However, most existing searchable encryption schemes only support single or conjunctive keyword search, while a few other schemes that can perform expressive keyword search are computationally inefficient since they are built from bilinear pairings over the composite-order groups. In this paper, we propose an expressive public-key searchable encryption scheme in the prime-order groups, which allows keyword search policies i.e., predicates, access structures to be expressed in conjunctive, disjunctive or any monotonic Boolean formulas and achieves significant performance improvement over existing schemes. We formally define its security and prove that it is selectively secure in the standard model. Also, we implement the proposed scheme using a rapid prototyping tool called Charm and conduct several experiments to evaluate it performance. The results demonstrate that our scheme is much more efficient than the ones built over the composite-order groups.
Category: Data Structures and Algorithms

[4] viXra:2004.0285 [pdf] submitted on 2020-04-12 05:08:49

Comparitive Study of Fileless Ransomware

Authors: Krishna B L
Comments: 9 Pages.

A Fileless Ransomware is a new type of ransomware primarily follows the mechanism of both ransomware and fileless malware. Detecting and Defending these kinds of attacks becoming a great obstacle for IT firms. Cybercriminals found a new way of extorting ransom with vicious methods mainly from big organizations, government, Telecom Industry and many more. Traditional AV Engines are not able to defend Fileless Malware. This paper describes the mechanism of both ransomware and fileless malware, the working of fileless ransomware, what are the possible attack vectors of fileless ransomware, variations of fileless ransomware and their instances, Prevention methods and recommendation to defend against Fileless ransomware.
Category: Data Structures and Algorithms

[3] viXra:2004.0247 [pdf] submitted on 2020-04-10 16:37:50

Comparative Study Of Linux and Windows

Authors: Umaima Khan
Comments: 18 Pages. This article has been originally published at www.ijarbas.com European International Journal, Vol.#2, Issue:2, February 2020.

Windows and Linux both are operating system. Windows is the famous operating system in market but it is not safe than Linux. With growing concern over operating system security, Linux got famous in the familial market place with that safety and efficiency. Lots of companies have been migrated from Windows towards Linux. The shortage of Linux experts has limited the development of Linux. If cost is deliberated than better is Linux than Windows. Windows is suitable for small matrices while Linux is suitable for large matrices. The aim of this paper is to conduct the survey over Linux and Windows. Basically this paper is comparative in this paper we have compared different methodologies related to Windows and Linux that are used in different researches. The results of different experiments related to Windows and Linux have been compared. Different approaches have been presented in previous researches to solve problems related to Windows and Linux. Keywords: Linux; Windows; operating system; virtual memory management; Simulation Windows Synchronization Mechanism,
Category: Data Structures and Algorithms

[2] viXra:2004.0223 [pdf] submitted on 2020-04-10 11:44:43

Robust Cryptographic Technique for Improving Data Security in Cloud Computing

Authors: Shouket Ahmad Kouchay
Comments: 6 Pages. RSA, blowfish algorithm, Cloud computing, encryption, decryption, data security

Cloud computing has revolutionized the IT world. Cloud computing is not only beneficial for everyday users but also for large enterprises, as it is capable of sharing large data in different forms and to safeguard that valuable data in secure storage, security management procedures must be implemented. Cloud computing is dynamically flexible as well as sizable and cost-efficient involving important virtual tools. There is not adequate security in usual asymmetric encryption, as single secret key in this algorithm could be hacked by some attackers. So there arises an improved data protection requirement. Different and effective ways to secure cloud computing has been introduced but the data remains at constant threat by security exploits. Secure storage in cloud computing is a fundamental move for the IT world. This research proposes an effective Cryptographic technique for securing the data in Cloud Computing that provides better security and accountability to data in the cloud. The primary analysis of the proposed technique demonstrates better performance results. This research also highlights many security issues in different encryption algorithms.
Category: Data Structures and Algorithms

[1] viXra:2004.0198 [pdf] submitted on 2020-04-08 14:35:22

Enhancing the Number of Lab Tests with a “poisoned Wine” Approach

Authors: Usama Kadri
Comments: 3 Pages.

Rapid testing of appropriate specimens from patients suspected for Coronavirus is of a great importance for the disease management and control. We propose complementary approaches to enhance processing large amounts of collected samples. The approaches are based on mixing samples in testing cups as opposed to testing single samples in each cup. As a result, the number of tests can be boosted by factors of magnitude, and the effective testing time can be reduced drastically.
Category: Data Structures and Algorithms