CINXE.COM
Search results for: graphical password
<!DOCTYPE html> <html lang="en" dir="ltr"> <head> <!-- Google tag (gtag.js) --> <script async src="https://www.googletagmanager.com/gtag/js?id=G-P63WKM1TM1"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-P63WKM1TM1'); </script> <!-- Yandex.Metrika counter --> <script type="text/javascript" > (function(m,e,t,r,i,k,a){m[i]=m[i]||function(){(m[i].a=m[i].a||[]).push(arguments)}; m[i].l=1*new Date(); for (var j = 0; j < document.scripts.length; j++) {if (document.scripts[j].src === r) { return; }} k=e.createElement(t),a=e.getElementsByTagName(t)[0],k.async=1,k.src=r,a.parentNode.insertBefore(k,a)}) (window, document, "script", "https://mc.yandex.ru/metrika/tag.js", "ym"); ym(55165297, "init", { clickmap:false, trackLinks:true, accurateTrackBounce:true, webvisor:false }); </script> <noscript><div><img src="https://mc.yandex.ru/watch/55165297" style="position:absolute; left:-9999px;" alt="" /></div></noscript> <!-- /Yandex.Metrika counter --> <!-- Matomo --> <!-- End Matomo Code --> <title>Search results for: graphical password</title> <meta name="description" content="Search results for: graphical password"> <meta name="keywords" content="graphical password"> <meta name="viewport" content="width=device-width, initial-scale=1, minimum-scale=1, maximum-scale=1, user-scalable=no"> <meta charset="utf-8"> <link href="https://cdn.waset.org/favicon.ico" type="image/x-icon" rel="shortcut icon"> <link href="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/css/bootstrap.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/plugins/fontawesome/css/all.min.css" rel="stylesheet"> <link href="https://cdn.waset.org/static/css/site.css?v=150220211555" rel="stylesheet"> </head> <body> <header> <div class="container"> <nav class="navbar navbar-expand-lg navbar-light"> <a class="navbar-brand" href="https://waset.org"> <img src="https://cdn.waset.org/static/images/wasetc.png" alt="Open Science Research Excellence" title="Open Science Research Excellence" /> </a> <button class="d-block d-lg-none navbar-toggler ml-auto" type="button" data-toggle="collapse" data-target="#navbarMenu" aria-controls="navbarMenu" aria-expanded="false" aria-label="Toggle navigation"> <span class="navbar-toggler-icon"></span> </button> <div class="w-100"> <div class="d-none d-lg-flex flex-row-reverse"> <form method="get" action="https://waset.org/search" class="form-inline my-2 my-lg-0"> <input class="form-control mr-sm-2" type="search" placeholder="Search Conferences" value="graphical password" name="q" aria-label="Search"> <button class="btn btn-light my-2 my-sm-0" type="submit"><i class="fas fa-search"></i></button> </form> </div> <div class="collapse navbar-collapse mt-1" id="navbarMenu"> <ul class="navbar-nav ml-auto align-items-center" id="mainNavMenu"> <li class="nav-item"> <a class="nav-link" href="https://waset.org/conferences" title="Conferences in 2024/2025/2026">Conferences</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/disciplines" title="Disciplines">Disciplines</a> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/committees" rel="nofollow">Committees</a> </li> <li class="nav-item dropdown"> <a class="nav-link dropdown-toggle" href="#" id="navbarDropdownPublications" role="button" data-toggle="dropdown" aria-haspopup="true" aria-expanded="false"> Publications </a> <div class="dropdown-menu" aria-labelledby="navbarDropdownPublications"> <a class="dropdown-item" href="https://publications.waset.org/abstracts">Abstracts</a> <a class="dropdown-item" href="https://publications.waset.org">Periodicals</a> <a class="dropdown-item" href="https://publications.waset.org/archive">Archive</a> </div> </li> <li class="nav-item"> <a class="nav-link" href="https://waset.org/page/support" title="Support">Support</a> </li> </ul> </div> </div> </nav> </div> </header> <main> <div class="container mt-4"> <div class="row"> <div class="col-md-9 mx-auto"> <form method="get" action="https://publications.waset.org/abstracts/search"> <div id="custom-search-input"> <div class="input-group"> <i class="fas fa-search"></i> <input type="text" class="search-query" name="q" placeholder="Author, Title, Abstract, Keywords" value="graphical password"> <input type="submit" class="btn_search" value="Search"> </div> </div> </form> </div> </div> <div class="row mt-3"> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Commenced</strong> in January 2007</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Frequency:</strong> Monthly</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Edition:</strong> International</div> </div> </div> <div class="col-sm-3"> <div class="card"> <div class="card-body"><strong>Paper Count:</strong> 377</div> </div> </div> </div> <h1 class="mt-3 mb-3 text-center" style="font-size:1.6rem;">Search results for: graphical password</h1> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">377</span> Providing a Secure Hybrid Method for Graphical Password Authentication to Prevent Shoulder Surfing, Smudge and Brute Force Attack</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Faraji%20Sepideh">Faraji Sepideh</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, purchase rate of the smart device is increasing and user authentication is one of the important issues in information security. Alphanumeric strong passwords are difficult to memorize and also owners write them down on papers or save them in a computer file. In addition, text password has its own flaws and is vulnerable to attacks. Graphical password can be used as an alternative to alphanumeric password that users choose images as a password. This type of password is easier to use and memorize and also more secure from pervious password types. In this paper we have designed a more secure graphical password system to prevent shoulder surfing, smudge and brute force attack. This scheme is a combination of two types of graphical passwords recognition based and Cued recall based. Evaluation the usability and security of our proposed scheme have been explained in conclusion part. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=brute%20force%20attack" title="brute force attack">brute force attack</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20password" title=" graphical password"> graphical password</a>, <a href="https://publications.waset.org/abstracts/search?q=shoulder%20surfing%20attack" title=" shoulder surfing attack"> shoulder surfing attack</a>, <a href="https://publications.waset.org/abstracts/search?q=smudge%20attack" title=" smudge attack"> smudge attack</a> </p> <a href="https://publications.waset.org/abstracts/114367/providing-a-secure-hybrid-method-for-graphical-password-authentication-to-prevent-shoulder-surfing-smudge-and-brute-force-attack" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/114367.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">161</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">376</span> Clicking Based Graphical Password Scheme Resistant to Spyware</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Bandar%20Alahmadi">Bandar Alahmadi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The fact that people tend to remember pictures better than texts, motivates researchers to develop graphical passwords as an alternative to textual passwords. Graphical passwords as such were introduced as a possible alternative to traditional text passwords, in which users prove their identity by clicking on pictures rather than typing alphanumerical text. In this paper, we present a scheme for graphical passwords that are resistant to shoulder surfing attacks and spyware attacks. The proposed scheme introduces a clicking technique to chosen images. First, the users choose a set of images, the images are then included in a grid where users can click in the cells around each image, the location of the click and the number of clicks are saved. As a result, the proposed scheme can be safe from shoulder surface and spyware attacks. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=password" title=" password"> password</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=attack" title=" attack"> attack</a>, <a href="https://publications.waset.org/abstracts/search?q=applications" title=" applications"> applications</a> </p> <a href="https://publications.waset.org/abstracts/139396/clicking-based-graphical-password-scheme-resistant-to-spyware" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/139396.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">165</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">375</span> Password Cracking on Graphics Processing Unit Based Systems</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=N.%20Gopalakrishna%20Kini">N. Gopalakrishna Kini</a>, <a href="https://publications.waset.org/abstracts/search?q=Ranjana%20Paleppady"> Ranjana Paleppady</a>, <a href="https://publications.waset.org/abstracts/search?q=Akshata%20K.%20Naik"> Akshata K. Naik</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Password authentication is one of the widely used methods to achieve authentication for legal users of computers and defense against attackers. There are many different ways to authenticate users of a system and there are many password cracking methods also developed. This paper is mainly to propose how best password cracking can be performed on a CPU-GPGPU based system. The main objective of this work is to project how quickly a password can be cracked with some knowledge about the computer security and password cracking if sufficient security is not incorporated to the system. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=GPGPU" title="GPGPU">GPGPU</a>, <a href="https://publications.waset.org/abstracts/search?q=password%20cracking" title=" password cracking"> password cracking</a>, <a href="https://publications.waset.org/abstracts/search?q=secret%20key" title=" secret key"> secret key</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20authentication" title=" user authentication"> user authentication</a> </p> <a href="https://publications.waset.org/abstracts/40190/password-cracking-on-graphics-processing-unit-based-systems" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40190.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">290</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">374</span> Evaluation of Gesture-Based Password: User Behavioral Features Using Machine Learning Algorithms</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lakshmidevi%20Sreeramareddy">Lakshmidevi Sreeramareddy</a>, <a href="https://publications.waset.org/abstracts/search?q=Komalpreet%20Kaur"> Komalpreet Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Nane%20Pothier"> Nane Pothier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Graphical-based passwords have existed for decades. Their major advantage is that they are easier to remember than an alphanumeric password. However, their disadvantage (especially recognition-based passwords) is the smaller password space, making them more vulnerable to brute force attacks. Graphical passwords are also highly susceptible to the shoulder-surfing effect. The gesture-based password method that we developed is a grid-free, template-free method. In this study, we evaluated the gesture-based passwords for usability and vulnerability. The results of the study are significant. We developed a gesture-based password application for data collection. Two modes of data collection were used: Creation mode and Replication mode. In creation mode (Session 1), users were asked to create six different passwords and reenter each password five times. In replication mode, users saw a password image created by some other user for a fixed duration of time. Three different duration timers, such as 5 seconds (Session 2), 10 seconds (Session 3), and 15 seconds (Session 4), were used to mimic the shoulder-surfing attack. After the timer expired, the password image was removed, and users were asked to replicate the password. There were 74, 57, 50, and 44 users participated in Session 1, Session 2, Session 3, and Session 4 respectfully. In this study, the machine learning algorithms have been applied to determine whether the person is a genuine user or an imposter based on the password entered. Five different machine learning algorithms were deployed to compare the performance in user authentication: namely, Decision Trees, Linear Discriminant Analysis, Naive Bayes Classifier, Support Vector Machines (SVMs) with Gaussian Radial Basis Kernel function, and K-Nearest Neighbor. Gesture-based password features vary from one entry to the next. It is difficult to distinguish between a creator and an intruder for authentication. For each password entered by the user, four features were extracted: password score, password length, password speed, and password size. All four features were normalized before being fed to a classifier. Three different classifiers were trained using data from all four sessions. Classifiers A, B, and C were trained and tested using data from the password creation session and the password replication with a timer of 5 seconds, 10 seconds, and 15 seconds, respectively. The classification accuracies for Classifier A using five ML algorithms are 72.5%, 71.3%, 71.9%, 74.4%, and 72.9%, respectively. The classification accuracies for Classifier B using five ML algorithms are 69.7%, 67.9%, 70.2%, 73.8%, and 71.2%, respectively. The classification accuracies for Classifier C using five ML algorithms are 68.1%, 64.9%, 68.4%, 71.5%, and 69.8%, respectively. SVMs with Gaussian Radial Basis Kernel outperform other ML algorithms for gesture-based password authentication. Results confirm that the shorter the duration of the shoulder-surfing attack, the higher the authentication accuracy. In conclusion, behavioral features extracted from the gesture-based passwords lead to less vulnerable user authentication. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=gesture-based%20passwords" title=" gesture-based passwords"> gesture-based passwords</a>, <a href="https://publications.waset.org/abstracts/search?q=machine%20learning%20algorithms" title=" machine learning algorithms"> machine learning algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=shoulder-surfing%20attacks" title=" shoulder-surfing attacks"> shoulder-surfing attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=usability" title=" usability"> usability</a> </p> <a href="https://publications.waset.org/abstracts/120239/evaluation-of-gesture-based-password-user-behavioral-features-using-machine-learning-algorithms" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/120239.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">107</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">373</span> A Survey on Smart Security Mechanism Using Graphical Passwords</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Aboli%20Dhanavade">Aboli Dhanavade</a>, <a href="https://publications.waset.org/abstracts/search?q=Shweta%20Bhimnath"> Shweta Bhimnath</a>, <a href="https://publications.waset.org/abstracts/search?q=Rutuja%20Jumale"> Rutuja Jumale</a>, <a href="https://publications.waset.org/abstracts/search?q=Ajay%20Nadargi"> Ajay Nadargi</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Security to any of our personal thing is our most basic need. It is not possible to directly apply that standard Human-computer—interaction approaches. Important usability goal for authentication system is to support users in selecting best passwords. Users often select text-passwords that are easy to remember, but they are more open for attackers to guess. The human brain is good in remembering pictures rather than textual characters. So the best alternative is being designed that is Graphical passwords. However, Graphical passwords are still immature. Conventional password schemes are also vulnerable to Shoulder-surfing attacks, many shoulder-surfing resistant graphical passwords schemes have been proposed. Next, we have analyzed the security and usability of the proposed scheme, and show the resistance of the proposed scheme to shoulder-surfing and different accidental logins. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=shoulder-surfing" title="shoulder-surfing">shoulder-surfing</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=authentication" title=" authentication"> authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=text-passwords" title=" text-passwords"> text-passwords</a> </p> <a href="https://publications.waset.org/abstracts/43659/a-survey-on-smart-security-mechanism-using-graphical-passwords" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/43659.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">362</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">372</span> Investigating the Factors Affecting on One Time Passwords Technology Acceptance: A Case Study in Banking Environment</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sajad%20Shokohuyar">Sajad Shokohuyar</a>, <a href="https://publications.waset.org/abstracts/search?q=Mahsa%20Zomorrodi%20Anbaji"> Mahsa Zomorrodi Anbaji</a>, <a href="https://publications.waset.org/abstracts/search?q=Saghar%20Pouyan%20Shad"> Saghar Pouyan Shad</a> </p> <p class="card-text"><strong>Abstract:</strong></p> According to fast technology growth, modern banking tries to decrease going to banks’ branches and increase customers’ consent. One of the problems which banks face is securing customer’s password. The banks’ solution is one time password creation system. In this research by adapting from acceptance of technology model theory, assesses factors that are effective on banking in Iran especially in using one time password machine by one of the private banks of Iran customers. The statistical population is all of this bank’s customers who use electronic banking service and one time password technology and the questionnaires were distributed among members of statistical population in 5 selected groups of north, south, center, east and west of Tehran. Findings show that confidential preservation, education, ease of utilization and advertising and informing has positive relations and distinct hardware and age has negative relations. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=electronic%20banking" title=" electronic banking"> electronic banking</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20time%20password" title=" one time password"> one time password</a>, <a href="https://publications.waset.org/abstracts/search?q=information%20technology" title=" information technology"> information technology</a> </p> <a href="https://publications.waset.org/abstracts/74555/investigating-the-factors-affecting-on-one-time-passwords-technology-acceptance-a-case-study-in-banking-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/74555.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">453</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">371</span> User Authentication Using Graphical Password with Sound Signature</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Devi%20Srinivas">Devi Srinivas</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Sindhuja"> K. Sindhuja</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents architecture to improve surveillance applications based on the usage of the service oriented paradigm, with smart phones as user terminals, allowing application dynamic composition and increasing the flexibility of the system. According to the result of moving object detection research on video sequences, the movement of the people is tracked using video surveillance. The moving object is identified using the image subtraction method. The background image is subtracted from the foreground image, from that the moving object is derived. So the Background subtraction algorithm and the threshold value is calculated to find the moving image by using background subtraction algorithm the moving frame is identified. Then, by the threshold value the movement of the frame is identified and tracked. Hence, the movement of the object is identified accurately. This paper deals with low-cost intelligent mobile phone-based wireless video surveillance solution using moving object recognition technology. The proposed solution can be useful in various security systems and environmental surveillance. The fundamental rule of moving object detecting is given in the paper, then, a self-adaptive background representation that can update automatically and timely to adapt to the slow and slight changes of normal surroundings is detailed. While the subtraction of the present captured image and the background reaches a certain threshold, a moving object is measured to be in the current view, and the mobile phone will automatically notify the central control unit or the user through SMS (Short Message System). The main advantage of this system is when an unknown image is captured by the system it will alert the user automatically by sending an SMS to user’s mobile. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=security" title="security">security</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20password" title=" graphical password"> graphical password</a>, <a href="https://publications.waset.org/abstracts/search?q=persuasive%20cued%20click%20points" title=" persuasive cued click points"> persuasive cued click points</a> </p> <a href="https://publications.waset.org/abstracts/23794/user-authentication-using-graphical-password-with-sound-signature" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23794.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">537</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">370</span> Graphical Modeling of High Dimension Processes with an Environmental Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ali%20S.%20Gargoum">Ali S. Gargoum</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Graphical modeling plays an important role in providing efficient probability calculations in high dimensional problems (computational efficiency). In this paper, we address one of such problems where we discuss fragmenting puff models and some distributional assumptions concerning models for the instantaneous, emission readings and for the fragmenting process. A graphical representation in terms of a junction tree of the conditional probability breakdown of puffs and puff fragments is proposed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=graphical%20models" title="graphical models">graphical models</a>, <a href="https://publications.waset.org/abstracts/search?q=influence%20diagrams" title=" influence diagrams"> influence diagrams</a>, <a href="https://publications.waset.org/abstracts/search?q=junction%20trees" title=" junction trees"> junction trees</a>, <a href="https://publications.waset.org/abstracts/search?q=Bayesian%20nets" title=" Bayesian nets"> Bayesian nets</a> </p> <a href="https://publications.waset.org/abstracts/6258/graphical-modeling-of-high-dimension-processes-with-an-environmental-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/6258.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">396</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">369</span> A Second Look at Gesture-Based Passwords: Usability and Vulnerability to Shoulder-Surfing Attacks</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Lakshmidevi%20Sreeramareddy">Lakshmidevi Sreeramareddy</a>, <a href="https://publications.waset.org/abstracts/search?q=Komalpreet%20Kaur"> Komalpreet Kaur</a>, <a href="https://publications.waset.org/abstracts/search?q=Nane%20Pothier"> Nane Pothier</a> </p> <p class="card-text"><strong>Abstract:</strong></p> For security purposes, it is important to detect passwords entered by unauthorized users. With traditional alphanumeric passwords, if the content of a password is acquired and correctly entered by an intruder, it is impossible to differentiate the password entered by the intruder from those entered by the authorized user because the password entries contain precisely the same character set. However, no two entries for the gesture-based passwords, even those entered by the person who created the password, will be identical. There are always variations between entries, such as the shape and length of each stroke, the location of each stroke, and the speed of drawing. It is possible that passwords entered by the unauthorized user contain higher levels of variations when compared with those entered by the authorized user (the creator). The difference in the levels of variations may provide cues to detect unauthorized entries. To test this hypothesis, we designed an empirical study, collected and analyzed the data with the help of machine-learning algorithms. The results of the study are significant. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=gesture-based%20passwords" title=" gesture-based passwords"> gesture-based passwords</a>, <a href="https://publications.waset.org/abstracts/search?q=shoulder-surfing%20attacks" title=" shoulder-surfing attacks"> shoulder-surfing attacks</a>, <a href="https://publications.waset.org/abstracts/search?q=usability" title=" usability"> usability</a> </p> <a href="https://publications.waset.org/abstracts/119827/a-second-look-at-gesture-based-passwords-usability-and-vulnerability-to-shoulder-surfing-attacks" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/119827.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">139</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">368</span> A Study on User Authentication Method Using Haptic Actuator and Security Evaluation</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Yo%20Han%20Choi">Yo Han Choi</a>, <a href="https://publications.waset.org/abstracts/search?q=Hee%20Suk%20Seo"> Hee Suk Seo</a>, <a href="https://publications.waset.org/abstracts/search?q=Seung%20Hwan%20Ju"> Seung Hwan Ju</a>, <a href="https://publications.waset.org/abstracts/search?q=Sung%20Hyu%20Han"> Sung Hyu Han</a> </p> <p class="card-text"><strong>Abstract:</strong></p> As currently various portable devices were launched, smart business conducted using them became common. Since smart business can use company-internal resources in an external remote place, user authentication that can identify authentic users is an important factor. Commonly used user authentication is a method of using user ID and Password. In the user authentication using ID and Password, the user should see and enter authentication information him or herself. In this user authentication system depending on the user’s vision, there is the threat of password leaks through snooping in the process which the user enters his or her authentication information. This study designed and produced a user authentication module using an actuator to respond to the snooping threat. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=actuator" title="actuator">actuator</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20authentication" title=" user authentication"> user authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20evaluation" title=" security evaluation"> security evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=haptic%20actuator" title=" haptic actuator"> haptic actuator</a> </p> <a href="https://publications.waset.org/abstracts/15894/a-study-on-user-authentication-method-using-haptic-actuator-and-security-evaluation" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/15894.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">346</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">367</span> Producing Graphical User Interface from Activity Diagrams</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Ebitisam%20K.%20Elberkawi">Ebitisam K. Elberkawi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohamed%20M.%20Elammari"> Mohamed M. Elammari</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Graphical User Interface (GUI) is essential to programming, as is any other characteristic or feature, due to the fact that GUI components provide the fundamental interaction between the user and the program. Thus, we must give more interest to GUI during building and development of systems. Also, we must give a greater attention to the user who is the basic corner in the dealing with the GUI. This paper introduces an approach for designing GUI from one of the models of business workflows which describe the workflow behavior of a system, specifically through activity diagrams (AD). <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=activity%20diagram" title="activity diagram">activity diagram</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20user%20interface" title=" graphical user interface"> graphical user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=GUI%20components" title=" GUI components"> GUI components</a>, <a href="https://publications.waset.org/abstracts/search?q=program" title=" program"> program</a> </p> <a href="https://publications.waset.org/abstracts/23487/producing-graphical-user-interface-from-activity-diagrams" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/23487.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">464</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">366</span> A User Identification Technique to Access Big Data Using Cloud Services</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=A.%20R.%20Manu">A. R. Manu</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20K.%20Agrawal"> V. K. Agrawal</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20N.%20Balasubramanya%20Murthy"> K. N. Balasubramanya Murthy</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Authentication is required in stored database systems so that only authorized users can access the data and related cloud infrastructures. This paper proposes an authentication technique using multi-factor and multi-dimensional authentication system with multi-level security. The proposed technique is likely to be more robust as the probability of breaking the password is extremely low. This framework uses a multi-modal biometric approach and SMS to enforce additional security measures with the conventional Login/password system. The robustness of the technique is demonstrated mathematically using a statistical analysis. This work presents the authentication system along with the user authentication architecture diagram, activity diagrams, data flow diagrams, sequence diagrams, and algorithms. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=design" title="design">design</a>, <a href="https://publications.waset.org/abstracts/search?q=implementation%20algorithms" title=" implementation algorithms"> implementation algorithms</a>, <a href="https://publications.waset.org/abstracts/search?q=performance" title=" performance"> performance</a>, <a href="https://publications.waset.org/abstracts/search?q=biometric%20approach" title=" biometric approach"> biometric approach</a> </p> <a href="https://publications.waset.org/abstracts/7131/a-user-identification-technique-to-access-big-data-using-cloud-services" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/7131.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">476</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">365</span> A Model-Driven Approach of User Interface for MVP Rich Internet Application</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sarra%20Roubi">Sarra Roubi</a>, <a href="https://publications.waset.org/abstracts/search?q=Mohammed%20Erramdani"> Mohammed Erramdani</a>, <a href="https://publications.waset.org/abstracts/search?q=Samir%20Mbarki"> Samir Mbarki</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents an approach for the model-driven generating of Rich Internet Application (RIA) focusing on the graphical aspect. We used well known Model-Driven Engineering (MDE) frameworks and technologies, such as Eclipse Modeling Framework (EMF), Graphical Modeling Framework (GMF), Query View Transformation (QVTo) and Acceleo to enable the design and the code automatic generation of the RIA. During the development of the approach, we focused on the graphical aspect of the application in terms of interfaces while opting for the Model View Presenter pattern that is designed for graphics interfaces. The paper describes the process followed to define the approach, the supporting tool and presents the results from a case study. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metamodel" title="metamodel">metamodel</a>, <a href="https://publications.waset.org/abstracts/search?q=model-driven%20engineering" title=" model-driven engineering"> model-driven engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=MVP" title=" MVP"> MVP</a>, <a href="https://publications.waset.org/abstracts/search?q=rich%20internet%20application" title=" rich internet application"> rich internet application</a>, <a href="https://publications.waset.org/abstracts/search?q=transformation" title=" transformation"> transformation</a>, <a href="https://publications.waset.org/abstracts/search?q=user%20interface" title=" user interface"> user interface</a> </p> <a href="https://publications.waset.org/abstracts/36531/a-model-driven-approach-of-user-interface-for-mvp-rich-internet-application" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/36531.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">353</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">364</span> Models Development of Graphical Human Interface Using Fuzzy Logic</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=%C3%89rick%20Arag%C3%A3o%20Ribeiro">Érick Aragão Ribeiro</a>, <a href="https://publications.waset.org/abstracts/search?q=George%20Andr%C3%A9%20Pereira%20Th%C3%A9"> George André Pereira Thé</a>, <a href="https://publications.waset.org/abstracts/search?q=Jos%C3%A9%20Marques%20Soares"> José Marques Soares</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Graphical Human Interface, also known as supervision software, are increasingly present in industrial processes supported by Supervisory Control and Data Acquisition (SCADA) systems and so it is evident the need for qualified developers. In order to make engineering students able to produce high quality supervision software, method for the development must be created. In this paper we propose model, based on the international standards ISO/IEC 25010 and ISO/IEC 25040, for the development of graphical human interface. When compared with to other methods through experiments, the model here presented leads to improved quality indexes, therefore help guiding the decisions of programmers. Results show the efficiency of the models and the contribution to student learning. Students assessed the training they have received and considered it satisfactory. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=software%20development%20models" title="software development models">software development models</a>, <a href="https://publications.waset.org/abstracts/search?q=software%20quality" title=" software quality"> software quality</a>, <a href="https://publications.waset.org/abstracts/search?q=supervision%20software" title=" supervision software"> supervision software</a>, <a href="https://publications.waset.org/abstracts/search?q=fuzzy%20logic" title=" fuzzy logic"> fuzzy logic</a> </p> <a href="https://publications.waset.org/abstracts/40132/models-development-of-graphical-human-interface-using-fuzzy-logic" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/40132.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">373</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">363</span> Integrated Model for Enhancing Data Security Performance in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amani%20A.%20Saad">Amani A. Saad</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20A.%20El-Farag"> Ahmed A. El-Farag</a>, <a href="https://publications.waset.org/abstracts/search?q=El-Sayed%20A.%20Helali"> El-Sayed A. Helali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20Ccomputing" title="cloud Ccomputing">cloud Ccomputing</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=SAAS" title=" SAAS"> SAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=PAAS" title=" PAAS"> PAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=IAAS" title=" IAAS"> IAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=Blowfish" title=" Blowfish"> Blowfish</a> </p> <a href="https://publications.waset.org/abstracts/17505/integrated-model-for-enhancing-data-security-performance-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17505.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">477</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">362</span> Ophthalmic Hashing Based Supervision of Glaucoma and Corneal Disorders Imposed on Deep Graphical Model</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=P.%20S.%20Jagadeesh%20Kumar">P. S. Jagadeesh Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Yang%20Yung"> Yang Yung</a>, <a href="https://publications.waset.org/abstracts/search?q=Mingmin%20Pan"> Mingmin Pan</a>, <a href="https://publications.waset.org/abstracts/search?q=Xianpei%20Li"> Xianpei Li</a>, <a href="https://publications.waset.org/abstracts/search?q=Wenli%20Hu"> Wenli Hu</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Glaucoma is impelled by optic nerve mutilation habitually represented as cupping and visual field injury frequently with an arcuate pattern of mid-peripheral loss, subordinate to retinal ganglion cell damage and death. Glaucoma is the second foremost cause of blindness and the chief cause of permanent blindness worldwide. Consequently, all-embracing study into the analysis and empathy of glaucoma is happening to escort deep learning based neural network intrusions to deliberate this substantial optic neuropathy. This paper advances an ophthalmic hashing based supervision of glaucoma and corneal disorders preeminent on deep graphical model. Ophthalmic hashing is a newly proposed method extending the efficacy of visual hash-coding to predict glaucoma corneal disorder matching, which is the faster than the existing methods. Deep graphical model is proficient of learning interior explications of corneal disorders in satisfactory time to solve hard combinatoric incongruities using deep Boltzmann machines. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=corneal%20disorders" title="corneal disorders">corneal disorders</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20Boltzmann%20machines" title=" deep Boltzmann machines"> deep Boltzmann machines</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20graphical%20model" title=" deep graphical model"> deep graphical model</a>, <a href="https://publications.waset.org/abstracts/search?q=glaucoma" title=" glaucoma"> glaucoma</a>, <a href="https://publications.waset.org/abstracts/search?q=neural%20networks" title=" neural networks"> neural networks</a>, <a href="https://publications.waset.org/abstracts/search?q=ophthalmic%20hashing" title=" ophthalmic hashing"> ophthalmic hashing</a> </p> <a href="https://publications.waset.org/abstracts/78678/ophthalmic-hashing-based-supervision-of-glaucoma-and-corneal-disorders-imposed-on-deep-graphical-model" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/78678.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">250</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">361</span> Enhancing Metaverse Security: A Multi-Factor Authentication Scheme</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=R.%20Chinnaiyaprabhu">R. Chinnaiyaprabhu</a>, <a href="https://publications.waset.org/abstracts/search?q=S.%20Bharanidharan"> S. Bharanidharan</a>, <a href="https://publications.waset.org/abstracts/search?q=V.%20Dharsana"> V. Dharsana</a>, <a href="https://publications.waset.org/abstracts/search?q=Rajalavanya"> Rajalavanya</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The concept of the Metaverse represents a potential evolution in the realm of cyberspace. In the early stages of Web 2.0, we observed a proliferation of online pseudonyms or 'nyms,' which increased the prevalence of fake accounts and made it challenging to establish unique online identities for various roles. However, in the era of Web 3.0, particularly in the context of the Metaverse, an individual's digital identity is intrinsically linked to their real-world identity. Consequently, actions taken in the Metaverse can carry significant consequences in the physical world. In light of these considerations, we propose the development of an innovative authentication system known as 'Metasec.' This system is designed to enhance security for digital assets, online identities, avatars, and user accounts within the Metaverse. Notably, Metasec operates as a password less authentication solution, relying on a multifaceted approach to security, encompassing device attestation, facial recognition, and pattern-based security keys. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=metaverse" title="metaverse">metaverse</a>, <a href="https://publications.waset.org/abstracts/search?q=multifactor%20authentication" title=" multifactor authentication"> multifactor authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=security" title=" security"> security</a>, <a href="https://publications.waset.org/abstracts/search?q=facial%20recognition" title=" facial recognition"> facial recognition</a>, <a href="https://publications.waset.org/abstracts/search?q=patten%20password" title=" patten password"> patten password</a> </p> <a href="https://publications.waset.org/abstracts/173767/enhancing-metaverse-security-a-multi-factor-authentication-scheme" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/173767.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">67</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">360</span> Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Pratama%20R.%20Yunia">Pratama R. Yunia</a>, <a href="https://publications.waset.org/abstracts/search?q=Firmansyah"> Firmansyah</a>, <a href="https://publications.waset.org/abstracts/search?q=I."> I.</a>, <a href="https://publications.waset.org/abstracts/search?q=Ariani"> Ariani</a>, <a href="https://publications.waset.org/abstracts/search?q=Ulfa%20R.%20Maharani"> Ulfa R. Maharani</a>, <a href="https://publications.waset.org/abstracts/search?q=Fikri%20M.%20Al"> Fikri M. Al</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=encryption%20scheme" title="encryption scheme">encryption scheme</a>, <a href="https://publications.waset.org/abstracts/search?q=hybrid%20cryptosystem" title=" hybrid cryptosystem"> hybrid cryptosystem</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20time%20password" title=" one time password"> one time password</a>, <a href="https://publications.waset.org/abstracts/search?q=SMS%20security" title=" SMS security"> SMS security</a> </p> <a href="https://publications.waset.org/abstracts/118902/secure-automatic-key-sms-encryption-scheme-using-hybrid-cryptosystem-an-approach-for-one-time-password-security-enhancement" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/118902.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">128</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">359</span> Integrated Model for Enhancing Data Security Processing Time in Cloud Computing</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Amani%20A.%20Saad">Amani A. Saad</a>, <a href="https://publications.waset.org/abstracts/search?q=Ahmed%20A.%20El-Farag"> Ahmed A. El-Farag</a>, <a href="https://publications.waset.org/abstracts/search?q=El-Sayed%20A.%20Helali"> El-Sayed A. Helali</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cloud%20computing" title="cloud computing">cloud computing</a>, <a href="https://publications.waset.org/abstracts/search?q=data%20security" title=" data security"> data security</a>, <a href="https://publications.waset.org/abstracts/search?q=SAAS" title=" SAAS"> SAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=PAAS" title=" PAAS"> PAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=IAAS" title=" IAAS"> IAAS</a>, <a href="https://publications.waset.org/abstracts/search?q=Blowfish" title=" Blowfish"> Blowfish</a> </p> <a href="https://publications.waset.org/abstracts/17211/integrated-model-for-enhancing-data-security-processing-time-in-cloud-computing" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17211.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">359</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">358</span> Easily Memorable Strong Password Generation and Retrieval</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Shatadru%20Das">Shatadru Das</a>, <a href="https://publications.waset.org/abstracts/search?q=Natarajan%20Vijayarangan"> Natarajan Vijayarangan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, a system and method for generating and recovering an authorization code has been designed and analyzed. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system has a provision to manage and retrieve 'forgotten authorization code'. This is done by fragmenting the base sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question-answer approach and with a secret key provided by the user. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=easy%20authentication" title="easy authentication">easy authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=key%20retrieval" title=" key retrieval"> key retrieval</a>, <a href="https://publications.waset.org/abstracts/search?q=memorable%20passwords" title=" memorable passwords"> memorable passwords</a>, <a href="https://publications.waset.org/abstracts/search?q=strong%20password%20generation" title=" strong password generation"> strong password generation</a> </p> <a href="https://publications.waset.org/abstracts/17238/easily-memorable-strong-password-generation-and-retrieval" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/17238.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">400</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">357</span> Graphical User Interface Testing by Using Deep Learning</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Akshat%20Mathur">Akshat Mathur</a>, <a href="https://publications.waset.org/abstracts/search?q=Sunil%20Kumar%20Khatri"> Sunil Kumar Khatri</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper presents brief about how the use of Artificial intelligence in respect to GUI testing can reduce workload by using DL-fueled method. This paper also discusses about how graphical user interface and event driven software testing can derive benefits from the use of AI techniques. The use of AI techniques not only reduces the task and work load but also helps in getting better output than manual testing. Although results are same, but the use of Artifical intelligence techniques for GUI testing has proven to provide ideal results. DL-fueled framework helped us to find imperfections of the entire webpage and provides test failure result in a score format between 0 and 1which signifies that are test meets it quality criteria or not. This paper proposes DL-fueled method which helps us to find the genuine GUI bugs and defects and also helped us to scale the existing labour-intensive and skill-intensive methodologies. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=graphical%20user%20interface" title="graphical user interface">graphical user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=GUI" title=" GUI"> GUI</a>, <a href="https://publications.waset.org/abstracts/search?q=artificial%20intelligence" title=" artificial intelligence"> artificial intelligence</a>, <a href="https://publications.waset.org/abstracts/search?q=deep%20learning" title=" deep learning"> deep learning</a>, <a href="https://publications.waset.org/abstracts/search?q=ML%20technology" title=" ML technology"> ML technology</a> </p> <a href="https://publications.waset.org/abstracts/104062/graphical-user-interface-testing-by-using-deep-learning" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/104062.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">177</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">356</span> Performance Evaluation of Fingerprint, Auto-Pin and Password-Based Security Systems in Cloud Computing Environment </h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Emmanuel%20Ogala">Emmanuel Ogala</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cloud computing has been envisioned as the next-generation architecture of Information Technology (IT) enterprise. In contrast to traditional solutions where IT services are under physical, logical and personnel controls, cloud computing moves the application software and databases to the large data centres, where the management of the data and services may not be fully trustworthy. This is due to the fact that the systems are opened to the whole world and as people tries to have access into the system, many people also are there trying day-in day-out on having unauthorized access into the system. This research contributes to the improvement of cloud computing security for better operation. The work is motivated by two problems: first, the observed easy access to cloud computing resources and complexity of attacks to vital cloud computing data system NIC requires that dynamic security mechanism evolves to stay capable of preventing illegitimate access. Second; lack of good methodology for performance test and evaluation of biometric security algorithms for securing records in cloud computing environment. The aim of this research was to evaluate the performance of an integrated security system (ISS) for securing exams records in cloud computing environment. In this research, we designed and implemented an ISS consisting of three security mechanisms of biometric (fingerprint), auto-PIN and password into one stream of access control and used for securing examination records in Kogi State University, Anyigba. Conclusively, the system we built has been able to overcome guessing abilities of hackers who guesses people password or pin. We are certain about this because the added security system (fingerprint) needs the presence of the user of the software before a login access can be granted. This is based on the placement of his finger on the fingerprint biometrics scanner for capturing and verification purpose for user’s authenticity confirmation. The study adopted the conceptual of quantitative design. Object oriented and design methodology was adopted. In the analysis and design, PHP, HTML5, CSS, Visual Studio Java Script, and web 2.0 technologies were used to implement the model of ISS for cloud computing environment. Note; PHP, HTML5, CSS were used in conjunction with visual Studio front end engine design tools and MySQL + Access 7.0 were used for the backend engine and Java Script was used for object arrangement and also validation of user input for security check. Finally, the performance of the developed framework was evaluated by comparing with two other existing security systems (Auto-PIN and password) within the school and the results showed that the developed approach (fingerprint) allows overcoming the two main weaknesses of the existing systems and will work perfectly well if fully implemented. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=performance%20evaluation" title="performance evaluation">performance evaluation</a>, <a href="https://publications.waset.org/abstracts/search?q=fingerprint" title=" fingerprint"> fingerprint</a>, <a href="https://publications.waset.org/abstracts/search?q=auto-pin" title=" auto-pin"> auto-pin</a>, <a href="https://publications.waset.org/abstracts/search?q=password-based" title=" password-based"> password-based</a>, <a href="https://publications.waset.org/abstracts/search?q=security%20systems" title=" security systems"> security systems</a>, <a href="https://publications.waset.org/abstracts/search?q=cloud%20%20computing%20environment" title=" cloud computing environment"> cloud computing environment</a> </p> <a href="https://publications.waset.org/abstracts/106693/performance-evaluation-of-fingerprint-auto-pin-and-password-based-security-systems-in-cloud-computing-environment" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/106693.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">140</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">355</span> A Method and System for Secure Authentication Using One Time QR Code</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Divyans%20Mahansaria">Divyans Mahansaria</a> </p> <p class="card-text"><strong>Abstract:</strong></p> User authentication is an important security measure for protecting confidential data and systems. However, the vulnerability while authenticating into a system has significantly increased. Thus, necessary mechanisms must be deployed during the process of authenticating a user to safeguard him/her from the vulnerable attacks. The proposed solution implements a novel authentication mechanism to counter various forms of security breach attacks including phishing, Trojan horse, replay, key logging, Asterisk logging, shoulder surfing, brute force search and others. QR code (Quick Response Code) is a type of matrix barcode or two-dimensional barcode that can be used for storing URLs, text, images and other information. In the proposed solution, during each new authentication request, a QR code is dynamically generated and presented to the user. A piece of generic information is mapped to plurality of elements and stored within the QR code. The mapping of generic information with plurality of elements, randomizes in each new login, and thus the QR code generated for each new authentication request is for one-time use only. In order to authenticate into the system, the user needs to decode the QR code using any QR code decoding software. The QR code decoding software needs to be installed on handheld mobile devices such as smartphones, personal digital assistant (PDA), etc. On decoding the QR code, the user will be presented a mapping between the generic piece of information and plurality of elements using which the user needs to derive cipher secret information corresponding to his/her actual password. Now, in place of the actual password, the user will use this cipher secret information to authenticate into the system. The authentication terminal will receive the cipher secret information and use a validation engine that will decipher the cipher secret information. If the entered secret information is correct, the user will be provided access to the system. Usability study has been carried out on the proposed solution, and the new authentication mechanism was found to be easy to learn and adapt. Mathematical analysis of the time taken to carry out brute force attack on the proposed solution has been carried out. The result of mathematical analysis showed that the solution is almost completely resistant to brute force attack. Today’s standard methods for authentication are subject to a wide variety of software, hardware, and human attacks. The proposed scheme can be very useful in controlling the various types of authentication related attacks especially in a networked computer environment where the use of username and password for authentication is common. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=authentication" title="authentication">authentication</a>, <a href="https://publications.waset.org/abstracts/search?q=QR%20code" title=" QR code"> QR code</a>, <a href="https://publications.waset.org/abstracts/search?q=cipher%20%2F%20decipher%20text" title=" cipher / decipher text"> cipher / decipher text</a>, <a href="https://publications.waset.org/abstracts/search?q=one%20time%20password" title=" one time password"> one time password</a>, <a href="https://publications.waset.org/abstracts/search?q=secret%20information" title=" secret information "> secret information </a> </p> <a href="https://publications.waset.org/abstracts/71171/a-method-and-system-for-secure-authentication-using-one-time-qr-code" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/71171.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">268</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">354</span> Curbing Cybercrime by Application of Internet Users’ Identification System (IUIS) in Nigeria</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=K.%20Alese%20Boniface">K. Alese Boniface</a>, <a href="https://publications.waset.org/abstracts/search?q=K.%20Adu%20Michael"> K. Adu Michael</a> </p> <p class="card-text"><strong>Abstract:</strong></p> Cybercrime is now becoming a big challenge in Nigeria apart from the traditional crime. Inability to identify perpetrators is one of the reasons for the growing menace. This paper proposes a design for monitoring internet users’ activities in order to curbing cybercrime. It requires redefining the operations of Internet Service Providers (ISPs) which will now mandate users to be authenticated before accessing the internet. In implementing this work which can be adapted to a larger scale, a virtual router application is developed and configured to mimic a real router device. A sign-up portal is developed to allow users to register with the ISP. The portal asks for identification information which will include bio-data and government issued identification data like National Identity Card number, et cetera. A unique username and password are chosen by the user to enable access to the internet which will be used to reference him to an Internet Protocol Address (IP Address) of any system he uses on the internet and thereby associating him to any criminal act related to that IP address at that particular time. Questions such as “What happen when another user knows the password and uses it to commit crime?” and other pertinent issues are addressed. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=cybercrime" title="cybercrime">cybercrime</a>, <a href="https://publications.waset.org/abstracts/search?q=sign-up%20portal" title=" sign-up portal"> sign-up portal</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20service%20provider%20%28ISP%29" title=" internet service provider (ISP)"> internet service provider (ISP)</a>, <a href="https://publications.waset.org/abstracts/search?q=internet%20protocol%20address%20%28IP%20address%29" title=" internet protocol address (IP address)"> internet protocol address (IP address)</a> </p> <a href="https://publications.waset.org/abstracts/12991/curbing-cybercrime-by-application-of-internet-users-identification-system-iuis-in-nigeria" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/12991.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">279</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">353</span> An Analysis of OpenSim Graphical User Interface Effectiveness</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Sina%20Saadati">Sina Saadati</a> </p> <p class="card-text"><strong>Abstract:</strong></p> OpenSim is a well-known software in biomechanical studies. There are worthy algorithms developed in this program which are used for modeling and simulation of human motions. In this research, we analyze the OpenSim application from the computer science perspective. It is important that every application have a user-friendly interface. An effective user interface can decrease the time, costs, and energy needed to learn how to use a program. In this paper, we survey the user interface of OpenSim as an important factor of the software. Finally, we infer that there are many challenges to be addressed in the development of OpenSim. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=biomechanics" title="biomechanics">biomechanics</a>, <a href="https://publications.waset.org/abstracts/search?q=computer%20engineering" title=" computer engineering"> computer engineering</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20user%20interface" title=" graphical user interface"> graphical user interface</a>, <a href="https://publications.waset.org/abstracts/search?q=modeling%20and%20simulation" title=" modeling and simulation"> modeling and simulation</a>, <a href="https://publications.waset.org/abstracts/search?q=interface%20effectiveness" title=" interface effectiveness"> interface effectiveness</a> </p> <a href="https://publications.waset.org/abstracts/168517/an-analysis-of-opensim-graphical-user-interface-effectiveness" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/168517.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">95</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">352</span> Evaluation of Three Digital Graphical Methods of Baseflow Separation Techniques in the Tekeze Water Basin in Ethiopia</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Alebachew%20Halefom">Alebachew Halefom</a>, <a href="https://publications.waset.org/abstracts/search?q=Navsal%20Kumar"> Navsal Kumar</a>, <a href="https://publications.waset.org/abstracts/search?q=Arunava%20Poddar"> Arunava Poddar</a> </p> <p class="card-text"><strong>Abstract:</strong></p> The purpose of this work is to specify the parameter values, the base flow index (BFI), and to rank the methods that should be used for base flow separation. Three different digital graphical approaches are chosen and used in this study for the purpose of comparison. The daily time series discharge data were collected from the site for a period of 30 years (1986 up to 2015) and were used to evaluate the algorithms. In order to separate the base flow and the surface runoff, daily recorded streamflow (m³/s) data were used to calibrate procedures and get parameter values for the basin. Additionally, the performance of the model was assessed by the use of the standard error (SE), the coefficient of determination (R²), and the flow duration curve (FDC) and baseflow indexes. The findings indicate that, in general, each strategy can be used worldwide to differentiate base flow; however, the Sliding Interval Method (SIM) performs significantly better than the other two techniques in this basin. The average base flow index was calculated to be 0.72 using the local minimum method, 0.76 using the fixed interval method, and 0.78 using the sliding interval method, respectively. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=baseflow%20index" title="baseflow index">baseflow index</a>, <a href="https://publications.waset.org/abstracts/search?q=digital%20graphical%20methods" title=" digital graphical methods"> digital graphical methods</a>, <a href="https://publications.waset.org/abstracts/search?q=streamflow" title=" streamflow"> streamflow</a>, <a href="https://publications.waset.org/abstracts/search?q=Emba%20Madre%20Watershed" title=" Emba Madre Watershed"> Emba Madre Watershed</a> </p> <a href="https://publications.waset.org/abstracts/160630/evaluation-of-three-digital-graphical-methods-of-baseflow-separation-techniques-in-the-tekeze-water-basin-in-ethiopia" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/160630.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">79</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">351</span> An Efficient Approach to Optimize the Cost and Profit of a Tea Garden by Using Branch and Bound Method</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Abu%20Hashan%20Md%20Mashud">Abu Hashan Md Mashud</a>, <a href="https://publications.waset.org/abstracts/search?q=M.%20Sharif%20Uddin"> M. Sharif Uddin</a>, <a href="https://publications.waset.org/abstracts/search?q=Aminur%20Rahman%20Khan"> Aminur Rahman Khan</a> </p> <p class="card-text"><strong>Abstract:</strong></p> In this paper, we formulate a new problem as a linear programming and Integer Programming problem and maximize profit within the limited budget and limited resources based on the construction of a tea garden problem. It describes a new idea about how to optimize profit and focuses on the practical aspects of modeling and the challenges of providing a solution to a complex real life problem. Finally, a comparative study is carried out among Graphical method, Simplex method and Branch and bound method. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=integer%20programming" title="integer programming">integer programming</a>, <a href="https://publications.waset.org/abstracts/search?q=tea%20garden" title=" tea garden"> tea garden</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20method" title=" graphical method"> graphical method</a>, <a href="https://publications.waset.org/abstracts/search?q=simplex%20method" title=" simplex method"> simplex method</a>, <a href="https://publications.waset.org/abstracts/search?q=branch%20and%20bound%20method" title=" branch and bound method"> branch and bound method</a> </p> <a href="https://publications.waset.org/abstracts/2584/an-efficient-approach-to-optimize-the-cost-and-profit-of-a-tea-garden-by-using-branch-and-bound-method" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/2584.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">623</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">350</span> Behind Egypt’s Financial Crisis: Dollarization</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Layal%20Mansour">Layal Mansour</a> </p> <p class="card-text"><strong>Abstract:</strong></p> This paper breaks down Egypt’s financial crisis by constructing a customized financial stress index by including the vulnerable economic indicator “dollarization” as a vulnerable indicator in the credit and exchange sector. The Financial Stress Index for Egypt (FSIE) includes informative vulnerable indicators of the main financial sectors: the banking sector, the equities market, and the foreign exchange market. It is calculated on a monthly basis from 2010 to December 2022, so to report the two recent world’s most devastating financial crises: Covid 19 crisis and Ukraine-Russia War, in addition to the local 2016 and 2022 financial crises. We proceed first by a graphical analysis then by empirical analysis in running under Vector Autoregression (VAR) Model, dynamic causality tests between foreign reserves, dollarization rate, and FSIE. The graphical analysis shows that unexpectedly, Egypt’s economy seems to be immune to internal economic/political instabilities, however it is highly exposed to the foreign and exchange market. Empirical analysis confirms the graphical observations and proves that dollarization, or more precisely debt in foreign currency seems to be the main trigger of Egypt’s current financial crisis. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=egypt" title="egypt">egypt</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20crisis" title=" financial crisis"> financial crisis</a>, <a href="https://publications.waset.org/abstracts/search?q=financial%20stress%20index" title=" financial stress index"> financial stress index</a>, <a href="https://publications.waset.org/abstracts/search?q=dollarization" title=" dollarization"> dollarization</a>, <a href="https://publications.waset.org/abstracts/search?q=VAR%20model" title=" VAR model"> VAR model</a>, <a href="https://publications.waset.org/abstracts/search?q=causality%20tests" title=" causality tests"> causality tests</a> </p> <a href="https://publications.waset.org/abstracts/161475/behind-egypts-financial-crisis-dollarization" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/161475.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">94</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">349</span> Advances on the Understanding of Sequence Convergence Seen from the Perspective of Mathematical Working Spaces</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Paula%20Verdugo-Hernandez">Paula Verdugo-Hernandez</a>, <a href="https://publications.waset.org/abstracts/search?q=Patricio%20Cumsille"> Patricio Cumsille</a> </p> <p class="card-text"><strong>Abstract:</strong></p> We analyze a first-class on the convergence of real number sequences, named hereafter sequences, to foster exploration and discovery of concepts through graphical representations before engaging students in proving. The main goal was to differentiate between sequences and continuous functions-of-a-real-variable and better understand concepts at an initial stage. We applied the analytic frame of mathematical working spaces, which we expect to contribute to extending to sequences since, as far as we know, it has only developed for other objects, and which is relevant to analyze how mathematical work is built systematically by connecting the epistemological and cognitive perspectives, and involving the semiotic, instrumental, and discursive dimensions. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=convergence" title="convergence">convergence</a>, <a href="https://publications.waset.org/abstracts/search?q=graphical%20representations" title=" graphical representations"> graphical representations</a>, <a href="https://publications.waset.org/abstracts/search?q=mathematical%20working%20spaces" title=" mathematical working spaces"> mathematical working spaces</a>, <a href="https://publications.waset.org/abstracts/search?q=paradigms%20of%20real%20analysis" title=" paradigms of real analysis"> paradigms of real analysis</a>, <a href="https://publications.waset.org/abstracts/search?q=real%20number%20sequences" title=" real number sequences"> real number sequences</a> </p> <a href="https://publications.waset.org/abstracts/133407/advances-on-the-understanding-of-sequence-convergence-seen-from-the-perspective-of-mathematical-working-spaces" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/133407.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">143</span> </span> </div> </div> <div class="card paper-listing mb-3 mt-3"> <h5 class="card-header" style="font-size:.9rem"><span class="badge badge-info">348</span> Exploring Students' Alternative Conception in Vector Components</h5> <div class="card-body"> <p class="card-text"><strong>Authors:</strong> <a href="https://publications.waset.org/abstracts/search?q=Umporn%20Wutchana">Umporn Wutchana</a> </p> <p class="card-text"><strong>Abstract:</strong></p> An open ended problem and unstructured interview had been used to explore students’ conceptual and procedural understanding of vector components. The open ended problem had been designed based on research instrument used in previous physics education research. Without physical context, we asked students to find out magnitude and draw graphical form of vector components. The open ended problem was given to 211 first year students of faculty of science during the third (summer) semester in 2014 academic year. The students spent approximately 15 minutes of their second time of the General Physics I course to complete the open ended problem after they had failed. Consequently, their responses were classified based on the similarity of errors performed in the responses. Then, an unstructured interview was conducted. 7 students were randomly selected and asked to reason and explain their answers. The study results showed that 53% of 211 students provided correct numerical magnitude of vector components while 10.9% of them confused and punctuated the magnitude of vectors in x- with y-components. Others 20.4% provided just symbols and the last 15.6% gave no answer. When asking to draw graphical form of vector components, only 10% of 211 students made corrections. A majority of them produced errors and revealed alternative conceptions. 46.5% drew longer and/or shorter magnitude of vector components. 43.1% drew vectors in different forms or wrote down other symbols. Results from the unstructured interview indicated that some students just memorized the method to get numerical magnitude of x- and y-components. About graphical form of component vectors, some students though that the length of component vectors should be shorter than those of the given one. So then, it could be combined to be equal length of the given vectors while others though that component vectors should has the same length as the given vectors. It was likely to be that many students did not develop a strong foundation of understanding in vector components but just learn by memorizing its solution or the way to compute its magnitude and attribute little meaning to such concept. <p class="card-text"><strong>Keywords:</strong> <a href="https://publications.waset.org/abstracts/search?q=graphical%20vectors" title="graphical vectors">graphical vectors</a>, <a href="https://publications.waset.org/abstracts/search?q=vectors" title=" vectors"> vectors</a>, <a href="https://publications.waset.org/abstracts/search?q=vector%20components" title=" vector components"> vector components</a>, <a href="https://publications.waset.org/abstracts/search?q=misconceptions" title=" misconceptions"> misconceptions</a>, <a href="https://publications.waset.org/abstracts/search?q=alternative%20conceptions" title=" alternative conceptions"> alternative conceptions</a> </p> <a href="https://publications.waset.org/abstracts/49280/exploring-students-alternative-conception-in-vector-components" class="btn btn-primary btn-sm">Procedia</a> <a href="https://publications.waset.org/abstracts/49280.pdf" target="_blank" class="btn btn-primary btn-sm">PDF</a> <span class="bg-info text-light px-1 py-1 float-right rounded"> Downloads <span class="badge badge-light">189</span> </span> </div> </div> <ul class="pagination"> <li class="page-item disabled"><span class="page-link">‹</span></li> <li class="page-item active"><span class="page-link">1</span></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=2">2</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=3">3</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=4">4</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=5">5</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=6">6</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=7">7</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=8">8</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=9">9</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=10">10</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=11">11</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=12">12</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=13">13</a></li> <li class="page-item"><a class="page-link" href="https://publications.waset.org/abstracts/search?q=graphical%20password&page=2" rel="next">›</a></li> </ul> </div> </main> <footer> <div id="infolinks" class="pt-3 pb-2"> <div class="container"> <div style="background-color:#f5f5f5;" class="p-3"> <div class="row"> <div class="col-md-2"> <ul class="list-unstyled"> About <li><a href="https://waset.org/page/support">About Us</a></li> <li><a href="https://waset.org/page/support#legal-information">Legal</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/WASET-16th-foundational-anniversary.pdf">WASET celebrates its 16th foundational anniversary</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Account <li><a href="https://waset.org/profile">My Account</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Explore <li><a href="https://waset.org/disciplines">Disciplines</a></li> <li><a href="https://waset.org/conferences">Conferences</a></li> <li><a href="https://waset.org/conference-programs">Conference Program</a></li> <li><a href="https://waset.org/committees">Committees</a></li> <li><a href="https://publications.waset.org">Publications</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Research <li><a href="https://publications.waset.org/abstracts">Abstracts</a></li> <li><a href="https://publications.waset.org">Periodicals</a></li> <li><a href="https://publications.waset.org/archive">Archive</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Open Science <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Philosophy.pdf">Open Science Philosophy</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Science-Award.pdf">Open Science Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Open-Society-Open-Science-and-Open-Innovation.pdf">Open Innovation</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Postdoctoral-Fellowship-Award.pdf">Postdoctoral Fellowship Award</a></li> <li><a target="_blank" rel="nofollow" href="https://publications.waset.org/static/files/Scholarly-Research-Review.pdf">Scholarly Research Review</a></li> </ul> </div> <div class="col-md-2"> <ul class="list-unstyled"> Support <li><a href="https://waset.org/page/support">Support</a></li> <li><a href="https://waset.org/profile/messages/create">Contact Us</a></li> <li><a href="https://waset.org/profile/messages/create">Report Abuse</a></li> </ul> </div> </div> </div> </div> </div> <div class="container text-center"> <hr style="margin-top:0;margin-bottom:.3rem;"> <a href="https://creativecommons.org/licenses/by/4.0/" target="_blank" class="text-muted small">Creative Commons Attribution 4.0 International License</a> <div id="copy" class="mt-2">© 2024 World Academy of Science, Engineering and Technology</div> </div> </footer> <a href="javascript:" id="return-to-top"><i class="fas fa-arrow-up"></i></a> <div class="modal" id="modal-template"> <div class="modal-dialog"> <div class="modal-content"> <div class="row m-0 mt-1"> <div class="col-md-12"> <button type="button" class="close" data-dismiss="modal" aria-label="Close"><span aria-hidden="true">×</span></button> </div> </div> <div class="modal-body"></div> </div> </div> </div> <script src="https://cdn.waset.org/static/plugins/jquery-3.3.1.min.js"></script> <script src="https://cdn.waset.org/static/plugins/bootstrap-4.2.1/js/bootstrap.bundle.min.js"></script> <script src="https://cdn.waset.org/static/js/site.js?v=150220211556"></script> <script> jQuery(document).ready(function() { /*jQuery.get("https://publications.waset.org/xhr/user-menu", function (response) { jQuery('#mainNavMenu').append(response); });*/ jQuery.get({ url: "https://publications.waset.org/xhr/user-menu", cache: false }).then(function(response){ jQuery('#mainNavMenu').append(response); }); }); </script> </body> </html>