Results for ' Lightweight Cryptography'

30 found
Order:
  1.  16
    OPTIMIZED ENCRYPTION PROTOCOL FOR LIGHTWEIGHT AND SEARCHABLE DATA IN IOT ENVIRONMENTS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):408-414.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  17
    Scalable Encryption Protocol for Searchable Data Management in IoT Systems.S. Arul Selvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Lightweight and Heavyweight Anti-physicalism.Damian Aleksiev - 2022 - Synthese 200 (112):1-23.
    I define two metaphysical positions that anti-physicalists can take in response to Jonathan Schaffer’s ground functionalism. Ground functionalism is a version of physicalism where explanatory gaps are everywhere. If ground functionalism is true, arguments against physicalism based on the explanatory gap between the physical and experiential facts fail. In response, first, I argue that some anti-physicalists are already safe from Schaffer’s challenge. These anti-physicalists reject an underlying assumption of ground functionalism: the assumption that macrophysical entities are something over and above (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  4. Nicholas Rescher, Leibniz and Cryptography: An Account on the Occasion of the Initial Exhibition of the Reconstruction of Leibniz’s Cipher Machine. [REVIEW]Stephen Puryear - 2014 - Review of Metaphysics 67 (4):882-884.
    In Part 1 of this short book, Rescher provides an overview of the nature and source of Leibniz’s interest in the theory and practice of cryptanalysis, including his unsuccessful bid to secure an apprentice for John Wallis (1616-1703) with a view to perpetuating the Englishman’s remarkable deciphering abilities. In Part 2, perhaps the most interesting part of the book, Rescher offers his account of the inner workings of Leibniz’s cipher machine. Part 3 provides a brief pictorial history of such machines (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Cloud Data Security Using Elliptic Curve Cryptography.Arockia Panimalars, N. Dharani, R. Aiswarya & Pavithra Shailesh - 2017 - International Research Journal of Engineering and Technology 9 (4).
    Data security is, protecting data from ill- conceived get to, utilize, introduction, intrusion, change, examination, recording or destruction. Cloud computing is a sort of Internet-based computing that grants conjoint PC handling resources and information to PCs what's more, different gadgets according to necessity. It is a model that empowers universal, on-request access to a mutual pool of configurable computing resources. At present, security has been viewed as one of the best issues in the improvement of Cloud Computing. The key issue (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  6. "That's not the issue": against a lightweight interpretation of ontological disputes.Manuel J. Sanchís Ferrer - manuscript
    In this paper I argue against what I label as "Lightweight interpretation of ontological disputes". This interpretation criteria sees ontological disputes as metalinguistic negotiations concerning the pursuing of practical objectives. I have developed an argument, called "That's not the issue", which shows that this interpretation criteria is inapplicable to most ontological disputes.
    Download  
     
    Export citation  
     
    Bookmark  
  7. Applications of (Neutro/Anti)sophications to Semihypergroups.A. Rezaei, Florentin Smarandache & S. Mirvakili - 2021 - Journal of Mathematics 2021 (1):1-7.
    A hypergroup, as a generalization of the notion of a group, was introduced by F. Marty in 1934. The first book in hypergroup theory was published by Corsini. Nowadays, hypergroups have found applications to many subjects of pure and applied mathematics, for example, in geometry, topology, cryptography and coding theory, graphs and hypergraphs, probability theory, binary relations, theory of fuzzy and rough sets and automata theory, physics, and also in biological inheritance.
    Download  
     
    Export citation  
     
    Bookmark  
  8. An Expressivist Theory of Taste Predicates.Dilip Ninan - forthcoming - Philosophers' Imprint.
    Simple taste predications come with an `acquaintance requirement': they require the speaker to have had a certain kind of first-hand experience with the object of predication. For example, if I tell you that the crème caramel is delicious, you would ordinarily assume that I have actually tasted the crème caramel and am not simply relying on the testimony of others. The present essay argues in favor of a lightweight expressivist account of the acquaintance requirement. This account consists of a (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  9. Electronic Coins.Craig Warmke - 2022 - Cryptoeconomic Systems 2 (1).
    In the bitcoin whitepaper, Satoshi Nakamoto (2008: 2) defines an electronic coin as a chain of digital signatures. Many have since defined a bitcoin as a chain of digital signatures. This latter definition continues to appear in reports from central banks, advocacy centers, and governments, as well as in academic papers across the disciplines of law, economics, computer science, cryptography, management, and philosophy. Some have even used it to argue that what we now call bitcoin is not the real (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  10. Fine-tuning MobileNetV2 for Sea Animal Classification.Mohammed Marouf & Samy S. Abu-Naser - 2024 - International Journal of Academic Information Systems Research (IJAISR) 8 (4):44-50.
    Abstract: Classifying sea animals is an important problem in marine biology and ecology as it enables the accurate identification and monitoring of species populations, which is crucial for understanding and protecting marine ecosystems. This paper addresses the problem of classifying 19 different sea animals using convolutional neural networks (CNNs). The proposed solution is to use a pretrained MobileNetV2 model, which is a lightweight and efficient CNN architecture, and fine-tune it on a dataset of sea animals. The results of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Integration of Intelligence Data through Semantic Enhancement.David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith - 2011 - In David Salmen, Tatiana Malyuta, Alan Hansen, Shaun Cronen & Barry Smith (eds.), Integration of Intelligence Data through Semantic Enhancement. CEUR, Vol. 808.
    We describe a strategy for integration of data that is based on the idea of semantic enhancement. The strategy promises a number of benefits: it can be applied incrementally; it creates minimal barriers to the incorporation of new data into the semantically enhanced system; it preserves the existing data (including any existing data-semantics) in their original form (thus all provenance information is retained, and no heavy preprocessing is required); and it embraces the full spectrum of data sources, types, models, and (...)
    Download  
     
    Export citation  
     
    Bookmark   10 citations  
  12. The EPS and XPS technical proprieties comparison and their usage in Albanian Contexed.Klodjan Xhexhi - 2023 - International Journal of Engineering and Science (IJES) 12 (3):20-24-1805.
    Extruded polystyrene (XPS) otherwise known as a thermoplastic polymer has a closed cell structure and is often stronger, with a higher mechanical performance. XPS is a pressed material and is sold in different thicknesses ranging from 2 cm to 10 cm, thus having a weight that varies from 28 to 45 kg/m3 due to the force and pressure exerted on it. In general, XPS material has very low thermal conductivity and is resistant to bending. This material obtains typical values of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Discrete and continuous: a fundamental dichotomy in mathematics.James Franklin - 2017 - Journal of Humanistic Mathematics 7 (2):355-378.
    The distinction between the discrete and the continuous lies at the heart of mathematics. Discrete mathematics (arithmetic, algebra, combinatorics, graph theory, cryptography, logic) has a set of concepts, techniques, and application areas largely distinct from continuous mathematics (traditional geometry, calculus, most of functional analysis, differential equations, topology). The interaction between the two – for example in computer models of continuous systems such as fluid flow – is a central issue in the applicable mathematics of the last hundred years. This (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  14. DES-Tutor: An Intelligent Tutoring System for Teaching DES Information Security Algorithm.Abed Elhaleem A. Elnajjar & Samy S. Abu Naser - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    : Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An (...)
    Download  
     
    Export citation  
     
    Bookmark   8 citations  
  15. An ontological investigation over human relations in linked data.Miroslav Vacura, Vojtěch Svátek & Aldo Gangemi - 2016 - Applied ontology 11 (3):227-254.
    The research presented in this article is motivated by the increasing importance of complex human relations in linked data, either extracted from social networks, or found in existing databases. The FOAF vocabulary, targeted in our research, plays a central role in those data, and is a model for lightweight ontologies largely used in linked data, such as the DBpedia ontology and schema-org. We provide an overview of FOAF and other approaches for describing human relations, followed by a detailed analysis (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Types and taxonomic structures in conceptual modeling: A novel ontological theory and engineering support.Giancarlo Guizzardi, Tiago Prince Sales, Claudenir M. Fonseca & Daniele Porello - 2021 - Data and Knowledge Engineering 1 (134):101891.
    Types are fundamental for conceptual modeling and knowledge representation, being an essential construct in all major modeling languages in these fields. Despite that, from an ontological and cognitive point of view, there has been a lack of theoretical support for precisely defining a consensual view on types. As a consequence, there has been a lack of precise methodological support for users when choosing the best way to model general terms representing types that appear in a domain, and for building sound (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  17. Disagreement and the Normativity of Truth beneath Cognitive Command.Filippo Ferrari - 2014 - Dissertation, University of Aberdeen
    This thesis engages with three topics and the relationships between them: (i) the phenomenon of disagreement (paradigmatically, where one person makes a claim and another denies it); (ii) the normative character of disagreements (the issue of whether, and in what sense, one of the parties is “at fault” for believing something that’s untrue); (iii) the issue of which theory of what truth is can best accommodate the norms relating belief and truth. People disagree about all sorts of things: about whether (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. The Metaphysical Commitments of Logic.Thomas Brouwer - 2013 - Dissertation, University of Leeds
    This thesis is about the metaphysics of logic. I argue against a view I refer to as ‘logical realism’. This is the view that the logical constants represent a particular kind of metaphysical structure, which I dub ‘logico-metaphysical structure’. I argue instead for a more metaphysically lightweight view of logic which I dub ‘logical expressivism’. -/- In the first part of this thesis (Chapters I and II) I argue against a number of arguments that Theodore Sider has given for (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  19. Hollow Truth.Louis deRosset - 2021 - Philosophical Review 130 (4):533-581.
    A raft of new philosophical problems concerning truth have recently been discovered by several theorists. These problems concern the question of how ascriptions of truth are to be grounded. Most previous commentators have taken the problems to shed light on the theory of ground. In this paper, I argue that they also shed light on the theory of truth. In particular, I argue that the notion of ground can be deployed to clearly articulate one strand of deflationary thinking about truth, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  20. Minimalism, fiction and ethical truth.Graham Oppy - manuscript
    Consider truth predicates. Minimalist analyses of truth predicates may involve commitment to some of the following claims: (i) truth “predicates” are not genuine predicates -- either because the truth “predicate” disappears under paraphrase or translation into deep structure, or because the truth “predicate” is shown to have a non-predicative function by performative or expressivist analysis, or because truth “predicates” must be traded in for predicates of the form “true-in-L”; (ii) truth predicates express ineligible, non-natural, gerrymandered properties; (iii) truth predicates express (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. An Appearance–Reality Distinction in an Unreal World.Allison Aitken - 2022 - Analysis 82 (1):114-130.
    Jan Westerhoff defends an account of thoroughgoing non-foundationalism that he calls “irrealism,” which is implicitly modeled on a Madhyamaka Buddhist view. In this paper, I begin by raising worries about the irrealist’s account of human cognition as taking place in a brain-based representational interface. Next, I pose first-order and higher-order challenges to how the irrealist—who defends a kind of global error theory—can sensibly accommodate an unlocalized appearance-reality distinction, both metaphysically and epistemologically. Finally, although Westerhoff insists that irrealism itself is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  22. Pro-Generative Adversarial Network and V-stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23.  10
    Efficient Cryptographic Methods for Secure Searchable Data in IoT Frameworks.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):409-415.
    As the Internet of Things (IoT) continues to expand, ensuring secure and efficient data storage and retrieval becomes a critical challenge. IoT devices, often constrained by limited computational resources, require lightweight encryption protocols that balance security and performance. This paper presents an optimized encryption protocol designed specifically for lightweight, searchable data in IoT environments. The proposed protocol utilizes advanced optimization techniques to enhance the efficiency and security of searchable encryption, enabling rapid data retrieval without compromising the integrity and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. ITS for teaching DES information security Algorithm.Abed Elhaleem A. Alnajar & Monnes Hanjory - 2017 - International Journal of Advanced Research and Development 2 (1):69-73.
    Lately there is more attention paid to technological development in intelligent tutoring systems. This field is becoming an interesting topic to many researchers. In this paper, we are presenting an intelligent tutoring system for teaching DES Information Security Algorithm called DES-Tutor. The DES-Tutor target the students enrolled in cryptography course in the department Information Technology in Al-Azhar University in Gaza. Through DES-Tutor the student will be able to study course material and try the exercises of each lesson. An evaluation (...)
    Download  
     
    Export citation  
     
    Bookmark  
  25. “Book Review: Libertarian Quandaries“. [REVIEW]Aiden P. Gregg - 2016 - Libertarian Papers 8:319-327.
    Libertarian Quandaries is a slim volume of tight reasoning that makes a resolute case for libertarianism. Libertarianism is “the social philosophy that identifies individual liberty as the most fundamental social value, and by extension treats moral cooperation as the only morally permissible form of social interaction.” More specifically, the book is a compendium of concise rebuttals to commonplace counterarguments advanced against libertarianism. It attempts to show that libertarianism withstands wide-ranging criticisms in principle, but also that it can be implemented in (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  26. (1 other version)Zeno Paradox, Unexpected Hanging Paradox (Modeling of Reality & Physical Reality, A Historical-Philosophical view).Farzad Didehvar - manuscript
    . In our research about Fuzzy Time and modeling time, "Unexpected Hanging Paradox" plays a major role. Here, we compare this paradox to the Zeno Paradox and the relations of them with our standard models of continuum and Fuzzy numbers. To do this, we review the project "Fuzzy Time and Possible Impacts of It on Science" and introduce a new way in order to approach the solutions for these paradoxes. Additionally, we have a more general discussion about paradoxes, as Philosophical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. A Review on Biometric Encryption System in Cloud Computing.Xiufeng Liu, Sheraz Arshad, Nosheen Nazir, Mubeen Fatima & Mahreen Mahi - 2018 - International Journal of Computer Science and Network Solutions 6 (1).
    This Review paper is about the security of bio metric templates in cloud databases. Biometrics is proved to be the best authentication method. However, the main concern is the security of the biometric template, the process to extract and stored in the database within the same database along with many other. Many techniques and methods have already been proposed to secure templates, but everything comes with its pros and cons, this paper provides a critical overview of these issues and solutions.
    Download  
     
    Export citation  
     
    Bookmark  
  28. A new approach in classical electrodynamics to protect principle of causality.Biswaranjan Dikshit - 2014 - Journal of Theoretical Physics and Cryptography 5:1-4.
    In classical electrodynamics, electromagnetic effects are calculated from solution of wave equation formed by combination of four Maxwell’s equations. However, along with retarded solution, this wave equation admits advanced solution in which case the effect happens before the cause. So, to preserve causality in natural events, the retarded solution is intentionally chosen and the advance part is just ignored. But, an equation or method cannot be called fundamental if it admits a wrong result (that violates principle of causality) in addition (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Reformulation of Dirac’s theory of electron to avoid negative energy or negative time solution.Biswaranjan Dikshit - 2017 - Journal of Theoretical Physics and Cryptography 13:1-4.
    Dirac’s relativistic theory of electron generally results in two possible solutions, one with positive energy and other with negative energy. Although positive energy solutions accurately represented particles such as electrons, interpretation of negative energy solution became very much controversial in the last century. By assuming the vacuum to be completely filled with a sea of negative energy electrons, Dirac tried to avoid natural transition of electron from positive to negative energy state using Pauli’s exclusion principle. However, many scientists like Bohr (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. Data Analysis, Analytics in Internet of Things and BigData.Mohammad Nezhad Hossein Shourkaei, Damghani Hamidreza, D. Leila & Hosseinian Heliasadat - 2019 - 4th International Conference on Combinatorics, Cryptography, Computer Science and Computation 4.
    The Internet-of-Things (IoT) is gradually being established as the new computing paradigm, which is bound to change the ways of our everyday working and living. IoT emphasizes the interconnection of virtually all types of physical objects (e.g., cell phones, wearables, smart meters, sensors, coffee machines and more) towards enabling them to exchange data and services among themselves, while also interacting with humans as well. Few years following the introduction of the IoT concept, significant hype was generated as a result of (...)
    Download  
     
    Export citation  
     
    Bookmark