804 research outputs found

    The Development of a Portable Hard Disk Encryption/Decryption System with a MEMS Coded Lock

    Get PDF
    In this paper, a novel portable hard-disk encryption/decryption system with a MEMS coded lock is presented, which can authenticate the user and provide the key for the AES encryption/decryption module. The portable hard-disk encryption/decryption system is composed of the authentication module, the USB portable hard-disk interface card, the ATA protocol command decoder module, the data encryption/decryption module, the cipher key management module, the MEMS coded lock controlling circuit module, the MEMS coded lock and the hard disk. The ATA protocol circuit, the MEMS control circuit and AES encryption/decryption circuit are designed and realized by FPGA(Field Programmable Gate Array). The MEMS coded lock with two couplers and two groups of counter-meshing-gears (CMGs) are fabricated by a LIGA-like process and precision engineering method. The whole prototype was fabricated and tested. The test results show that the user's password could be correctly discriminated by the MEMS coded lock, and the AES encryption module could get the key from the MEMS coded lock. Moreover, the data in the hard-disk could be encrypted or decrypted, and the read-write speed of the dataflow could reach 17 MB/s in Ultra DMA mode

    Privacy-Preserving Restricted Boltzmann Machine

    Get PDF
    With the arrival of the big data era, it is predicted that distributed data mining will lead to an information technology revolution. To motivate different institutes to collaborate with each other, the crucial issue is to eliminate their concerns regarding data privacy. In this paper, we propose a privacy-preserving method for training a restricted boltzmann machine (RBM). The RBM can be got without revealing their private data to each other when using our privacy-preserving method. We provide a correctness and efficiency analysis of our algorithms. The comparative experiment shows that the accuracy is very close to the original RBM model

    Sistem Rekomendasi Artikel Ilmiah Berbasis Web Menggunakan Content-based Learning dan Collaborative Filtering

    Get PDF
    Penelitian ini mengimplementasikan metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web untuk merekomendasikan artikel ilmiah berbahasa Inggris. Sistem memiliki empat komponen, yaitu analisa konten, profile learner, komponen penyaringan, dan pengambilan dokumen. Content-based learning diimplementasikan pada komponen analisa konten yang bertugas mengidentifikasi masukan berupa artikel ilmiah berbahasa Inggris. Profile learner dilakukan untuk menghitung kemiripan antar pengguna setelah sistem mendapatkan feedback berupa rating dari pengguna. Collaborative filtering diimplementasikan pada komponen penyaringan yang bertugas untuk merekomendasikan artikel kepada pengguna setelah sistem mendapatkan hasil kemiripan antar pengguna.  Pengambilan dokumen dilakukan pada proses pengambilan artikel yang dicari oleh pengguna. Uji coba dilakukan pada 100 artikel ilmiah, 6 kelas kategori, serta melibatkan 35 pengguna. Hasil penelitian ini membuktikan bahwa implementasi metode content-based learning dan collaborative filtering pada sistem rekomendasi artikel ilmiah berbasis web mampu memberikan tingkat relevansi dan efektifitas sebesar 0.801 berdasarkan Mean Average Precision dan 0,851 berdasarkan Mean Absolute Error

    Fast, parallel and secure cryptography algorithm using Lorenz's attractor

    Full text link
    A novel cryptography method based on the Lorenz's attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher in
    • …
    corecore