804 research outputs found
The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock
In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode
Privacy-Preserving Restricted Boltzmann Machine
With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model
Sistem Rekomendasi Artikel Ilmiah Berbasis Web Menggunakan Content-based Learning dan Collaborative Filtering
Penelitian ini mengimplementasikan metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web untuk merekomendasikan artikel ilmiah berbahasa Inggris. Sistem memiliki empat komponen, yaitu analisa konten, profile learner, komponen penyaringan, dan pengambilan dokumen. Content-based learning diimplementasikan pada komponen analisa konten yang bertugas mengidentifikasi masukan berupa artikel ilmiah berbahasa Inggris. Profile learner dilakukan untuk menghitung kemiripan antar pengguna setelah sistem mendapatkan feedback berupa rating dari pengguna. Collaborative filtering diimplementasikan pada komponen penyaringan yang bertugas untuk merekomendasikan artikel kepada pengguna setelah sistem mendapatkan hasil kemiripan antar pengguna. Pengambilan dokumen dilakukan pada proses pengambilan artikel yang dicari oleh pengguna. Uji coba dilakukan pada 100 artikel ilmiah, 6 kelas kategori, serta melibatkan 35 pengguna. Hasil penelitian ini membuktikan bahwa implementasi metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web mampu memberikan tingkat relevansi dan efektifitas sebesar 0.801 berdasarkan Mean Average Precision dan 0,851 berdasarkan Mean Absolute Error
Fast, parallel and secure cryptography algorithm using Lorenz's attractor
A novel cryptography method based on the Lorenz's attractor chaotic system is
presented. The proposed algorithm is secure and fast, making it practical for
general use. We introduce the chaotic operation mode, which provides an
interaction among the password, message and a chaotic system. It ensures that
the algorithm yields a secure codification, even if the nature of the chaotic
system is known. The algorithm has been implemented in two versions: one
sequential and slow and the other, parallel and fast. Our algorithm assures the
integrity of the ciphertext (we know if it has been altered, which is not
assured by traditional algorithms) and consequently its authenticity. Numerical
experiments are presented, discussed and show the behavior of the method in
terms of security and performance. The fast version of the algorithm has a
performance comparable to AES, a popular cryptography program used commercially
nowadays, but it is more secure, which makes it immediately suitable for
general purpose cryptography applications. An internet page has been set up,
which enables the readers to test the algorithm and also to try to break into
the cipher in
- …