International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 210 - 222
Опубликована: Май 24, 2022
Election
is
a
basic
democratic
tool
that
offers
an
official
mechanism
for
the
people
to
express
their
opinions
in
order
form
government
by
means.
Electronic
voting
has
evolved
into
most
significant
application
of
e-governance
and
e-democracy.
Few
countries
have
recently
taken
opportunity
test
use
electronic
systems.
Also,
many
expect
internet
will
become
reality
during
next
decade.
In
conventional
system,
electors
authenticate
themselves
displaying
credentials;
this
move
open
public
validated
poll
workers.
During
authentication,
they
are
manually
checked
before
being
eligible
vote.
The
standard
system
more
costly
needs
human
capital.
Because
these
factors,
whole
world
heading
toward
trend
e-voting.
devices
supposed
be
answer
shortages.
A
secure
e-voting
must
meet
criteria,
including
uniqueness,
performance,
fairness,
stability,
safety,
anonymity.
Blockchain
modern
security
solution,
which
capable
securing
system.
distributed
ledger.
Each
block
contains
only
one
transaction.
Block
chain
provides
using
cryptography
hashing.
perfect
infrastructure
provide
netwms.ork.
along
with
smart
contracts
need
hour
improvise
This
paper
presents
blockchain
based
framework
e-electronic
Iraq.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2022,
Номер
18(12), С. 89 - 105
Опубликована: Сен. 14, 2022
This
research
is
aimed
at
planning
the
manner
in
which
secure
5G
communication
can
be
controlled
based
on
traffic
floods.
To
accomplish
excellent
administration
execution
of
organization
observing
and
directing
calculation
inescapable,
dynamic
steering
actual
equipment
isn't
reasonable
for
practical
plans
action.
Accordingly,
to
bring
down
functional
capital
consumption,
we
propose
a
strategy
called
versatile
made
do
with
help
(Quality
Service
MANET
(Mobile
specially
appointed
Network).
A
model
will
fulfilling
needs
customers
simultaneously
gives
huge
investment
funds
item
cost
convenience
was
presented
this
paper.
perform
steering,
planned
geography
virtualized
climate.
We
customized
CHAOS
network
flood
board
goes
about
as
consistent
northward
API
directing.
Network
infused
dynamically
from
1MB
up
10MB
(connect
b/w)
progressive
way
similar
10
occurrences.
In
conclusion,
performed
applying
control
hypothetical
method
assistance
calculations.
By
looking
two
situations,
noticed
prominent
distinction
throughput
controlling
application
MANETs.
data
refreshed
after
clockwork.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(10), С. 122 - 139
Опубликована: Май 24, 2022
Dark
web
is
a
canopy
concept
that
denotes
any
kind
of
illicit
activities
carried
out
by
anonymous
persons
or
organizations,
thereby
making
it
difficult
to
trace.
The
content
on
the
dark
constantly
updated
and
changed.
collection
classification
such
illegal
are
challenging
tasks,
as
they
time-consuming.
This
problem
has
in
recent
times
emerged
an
issue
requires
quick
attention
from
both
industry
academia.
To
this
end,
efforts
have
been
made
article
crawler
capable
collecting
pages,
cleaning
them,
saving
them
document
database,
proposed.
carries
automatic
gathered
pages
into
five
classes.
classifiers
used
classifying
include
Linear
Support
Vector
Classifier
(SVC),
Naïve
Bayes
(NB),
Document
Frequency
(TF-IDF).
experimental
results
revealed
accuracy
rate
92%
81%
were
achieved
SVC
NB,
respectively.
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(13), С. 4 - 14
Опубликована: Июль 11, 2022
An
interesting
paradigm
is
a
metaverse
which
represents
the
next
generation
of
using
internet
to
improve
human
lives
and
provide
new
way
communicate
by
building
system
that
let
user
represented
their
avatar
work,
socialize
play
virtually
integrating
multiple
technologies
such
as
blockchain,
artificial
intelligence
well
virtual
augmented
reality.
However,
this
may
preserve
many
problems
related
security
privacy
starting
from
data
breaches
identity
theft,
in
paper
an
overview
world
architecture
connects
real
discuss
main
risks
within
Metaverse
Periodicals of Engineering and Natural Sciences (PEN),
Год журнала:
2021,
Номер
10(1), С. 178 - 178
Опубликована: Дек. 30, 2021
Copyright
is
a
tool
for
preventing
anyone
forged
to
copy
an
electronic
work
from
another
person
and
claim
that
referred
him.
Since
the
identity
of
always
determined
by
his
name
biometrics,
there
concern
handle
this
information,
preserve
copyright.
In
paper,
new
idea
copyright
technology
used
prove
video
copyright,
using
blind
watermarking
technique,
ownership
information
hidden
inside
frames
linear
congruential
generator
(LCG)
adapted
locations
vector
features
extracted
biometric
image
owner
instead
watermark
in
Pseudo
Noise
sequences
or
any
other
feature
extraction
technique.
When
providing
watermarked
vector,
statistical
operation
increase
randomization
state
amplifier
factors
LCG
function.
provides
random
positions
where
owner's
stored
video.
The
proposed
method
not
difficult
execute
can
present
adaptable
imperceptibility
robustness
performance.
output
results
show
approach
based
on
average
PSNR
embedded
50
around
47.5
dB
while
remains
undetectable.
MSSIM
values
with
range
(0.83
0.99).
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 34 - 48
Опубликована: Апрель 26, 2022
The
past
few
years
have
witnessed
a
huge
increase
in
the
application
of
facial
recognition,
detection,
and
analysis
technology.
However,
face
recognition
systems
remain
most
popular
among
general
public.
system
can
detect
presence
when
exposed
to
one.
accuracy
fairness
that
be
derived
from
such
necessitate
their
use,
because
humans,
particularly
security
personnel
tired
target
wrong
person
as
suspect.
artificial
intelligence
are
properly
trained
capable
efficiently
identifying
classifying
faces
without
errors.
In
this
work,
use
Matlab
language
was
employed
building
software
is
recognizing
differentiating
different
patterns.
proposed
equipped
with
camera
serves
practical
aspect
captures
shots
sent
theoretical
part
special
program
designed
recognize
by
comparing
them
database
stored
within
program.
work
involved
Quantum
Neural
Network.
training
dataset
made
up
features
vectors
were
obtained
well-known
set
images
people.
Here,
Principle
Component
Analysis
(PCA)
used
for
extraction
feature
then
prepared
next
step.
experimental
results
revealed
efficient
achieved
through
well-trained
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2022,
Номер
16(08), С. 124 - 137
Опубликована: Апрель 26, 2022
A
major
issue
in
the
field
of
education
is
exam
malpractice
and
other
forms
academic
dishonesty,
where
efforts
made
towards
assessment
students
are
undercut.
In
order
to
address
this
menace,
a
cheating
detection
system
has
been
proposed
study.
The
can
detect
real-time.
uses
video
surveillance
monitor
activities
student
during
exams,
especially
abnormal
behavior.
development
involved
use
three
different
techniques,
with
functions.
first
technique
helps
determining
direction
students’
heads
when
they
move
from
their
initial
direction,
which
script.
Some
form
involves
peeping
at
scripts
people
writing
same
exam.
Whenever
observes
deviation
that
exceeds
set
threshold,
it
classifies
behavior
as
abnormal.
second
works
movement
student’s
iris.
It
detects
iris
moves
copy
answers
written
documents
like
mobile
phones,
books,
hands,
summary
papers.
third
used
identifying
contact
between
hands
face,
well
for
shared
students,
such
sharing
incriminating
materials.
When
any
these
detected,
an
automatic
alarm
alerts
authority
about
thereby
minimizing
error
rate
occur
result
manual
monitoring.
International Journal of Online and Biomedical Engineering (iJOE),
Год журнала:
2023,
Номер
19(06), С. 4 - 17
Опубликована: Май 16, 2023
In
cloud
computing,
resources
are
used
to
communicate
instead
of
local
servers
or
individual
devices.
However,
sharing
among
several
users
is
a
difficult
issue
in
communication.
Cryptography
and
steganography
techniques
for
storage
address
data
security
challenges.
This
paper
presents
novel
method
securely
encrypting
image
transmission
link
exchange
with
service.
There
two
phases
accomplish
the
encryption
process,
first
phase
encrypts
file
by
XORing
it
random
key
that
generated
new
hybrid
chaotic
map.
The
second
converts
encrypted
format
audio
add
another
layer
improve
secure
transfer.
using
map
has
benefit
having
more
than
10256
spaces
necessary
level
security.
Based
on
statistical
analysis
encryption,
quality
evaluated
criteria,
results
demonstrate
algorithm's
ability
resist
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(08), С. 113 - 134
Опубликована: Апрель 26, 2023
In
the
realm
of
robotics
and
interactive
systems,
gender
recognition
is
a
crucial
problem.
Considering
several
uses
it
has
in
security,
web
search,
human-computer
interactions,
etc.,
from
facial
photos
garnered
lot
attention.
The
need
to
use
enhance
techniques
felt
more
strongly
today
due
significant
development
design
systems.
Relatively
speaking
other
approaches,
progress
gained
this
area
thus
far
not
exceptional.
Thus,
novel
method
been
adopted
study
improve
accuracy
comparison
earlier
research.
To
create
best
rate
efficiency
suggested
research,
we
choose
minimal
set
characteristics.
Testing
on
FERET
UTK-Face
datasets
reveals
that
our
algorithm
lower
degree
inaccuracy.
article,
input
image
person's
face
pre-processed
extract
right
features
once
recognized.
Gender
separation
achieved
using
Multi-class
Support
Vector
Machine
(SVM)
Classifiers
after
normalized
images
have
extracted
Histogram
Oriented
Gradient
(HOG),
Gabor
Filters,
Speeded
Up
Robust
Features
(SURF),
as
well
their
combination
select
most
appropriate
feature
them
for
classification.
As
reduction
feature,
Principal
Component
Analysis
(PCA)
also
employed.
Using
proposed
approach,
98.75%
precision
accomplished
database
runtime
performance
0.4
Sec.
database,
97.43%
0.5
International Journal of Interactive Mobile Technologies (iJIM),
Год журнала:
2023,
Номер
17(07), С. 167 - 178
Опубликована: Апрель 5, 2023
The
highest
way
to
protect
data
from
intruder
and
unauthorized
persons
has
become
a
major
issue.
This
matter
led
the
development
of
many
techniques
for
security,
such
as
Steganography,
Cryptography,
Watermarking
disguise
data.
paper
proposes
an
image
steganography
method
using
Least
Significant
Bits
(LSB)
technique
XOR
operator
secret
key,
through
which
key
is
transformed
into
one-dimensional
bit
stream
array,
then
these
bits
are
XORed
with
image.
Multiple
experiments
have
been
performed
embed
color
grayscale
images
inside
cover
media.
In
this
work,
LSB
ideal
in
two
ways:
firstly,
only
least
significant
one-bit
(1bit)
each
byte
will
store
embedded
data,
named
(1-LSB).
Secondly,
four
right
half-byte
(4
bits)
(4-LSB).
Subjective
objective
analyzes
were
process.
subjective
analysis
responsible
both
HVS
histogram,
whereas
involved
PSNR
MSE
metrics.